CVE-2016-4954

Priority
Description
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before
4.2.8p8 allows remote attackers to cause a denial of service (peer-variable
modification) by sending spoofed packets from many source IP addresses in a
certain scenario, as demonstrated by triggering an incorrect leap
indication.
Notes
Package
Source: ntp (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 16.04 ESM:released (1:4.2.8p4+dfsg-3ubuntu5.3)
Ubuntu 14.04 ESM:released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
Ubuntu 20.04 FIPS Compliant:not-affected (1:4.2.8p8+dfsg-1ubuntu2)
Patches:
Vendor:http://pkgs.fedoraproject.org/cgit/rpms/ntp.git/tree/ntp-4.2.6p5-cve-2016-4954.patch
More Information

Updated: 2022-04-13 12:22:39 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)