cve-2016-2517
Vulnerability from cvelistv5
Published
2017-01-30 21:00
Modified
2024-08-05 23:32
Severity ?
Summary
NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T23:32:20.572Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.ntp.org/bin/view/Main/NtpBug3010"
          },
          {
            "name": "88189",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/88189"
          },
          {
            "name": "VU#718152",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://www.kb.cert.org/vuls/id/718152"
          },
          {
            "name": "1035705",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1035705"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20171004-0002/"
          },
          {
            "name": "FreeBSD-SA-16:16",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc"
          },
          {
            "name": "GLSA-201607-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201607-15"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-02-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-20T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.ntp.org/bin/view/Main/NtpBug3010"
        },
        {
          "name": "88189",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/88189"
        },
        {
          "name": "VU#718152",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://www.kb.cert.org/vuls/id/718152"
        },
        {
          "name": "1035705",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1035705"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20171004-0002/"
        },
        {
          "name": "FreeBSD-SA-16:16",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc"
        },
        {
          "name": "GLSA-201607-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201607-15"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-2517",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.ntp.org/bin/view/Main/NtpBug3010",
              "refsource": "CONFIRM",
              "url": "http://support.ntp.org/bin/view/Main/NtpBug3010"
            },
            {
              "name": "88189",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/88189"
            },
            {
              "name": "VU#718152",
              "refsource": "CERT-VN",
              "url": "https://www.kb.cert.org/vuls/id/718152"
            },
            {
              "name": "1035705",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1035705"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20171004-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20171004-0002/"
            },
            {
              "name": "FreeBSD-SA-16:16",
              "refsource": "FREEBSD",
              "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc"
            },
            {
              "name": "GLSA-201607-15",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201607-15"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-2517",
    "datePublished": "2017-01-30T21:00:00",
    "dateReserved": "2016-02-20T00:00:00",
    "dateUpdated": "2024-08-05T23:32:20.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-2517\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-01-30T21:59:01.033\",\"lastModified\":\"2017-11-21T02:29:04.040\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.\"},{\"lang\":\"es\",\"value\":\"NTP en versiones anteriores a 4.2.8p7 y 4.3.x en versiones anteriores a 4.3.92 permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (evitar la posterior autenticaci\u00f3n) aprovechando el conocimiento de la clave de control o requestkey y enviando un paquete creado a ntpd, que cambia el valor de trustedkey, Controlkey o requestkey. NOTA: esta vulnerabilidad existe debido a una regresi\u00f3n de la CVE-2016-2516.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:S/C:N/I:N/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":4.9},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:p6:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.8\",\"matchCriteriaId\":\"E2CF4922-E481-4C5B-9A34-F439D9C727FE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C1CCF6F-74C6-42D7-B88B-36ED73BB1F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B23D9009-DF45-44C1-80DF-CEEC9B9E3F20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43921601-667E-4415-83BE-E5B39D969BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DD9C02-0C46-4785-8D77-C5465E4ED967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A497BADE-0516-494F-89FA-EAFC6AD17F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4298439A-EAF2-4CAA-990B-4AA37E7A0E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E9C822-C04A-4908-9596-76F9FB561206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EBD400-8EC1-4F9C-B600-85B8FF3BDEA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6CFF4C-2620-4FD6-91A2-C0D0DAA4287D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"842963D1-C78C-48B5-A8D2-BC018854E5CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121ED6C5-8985-4DEF-9040-2AC63582E596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"566B4B99-8B4F-4ED8-B2DC-D90EC71ECB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68499DA4-64EF-412F-A434-8E0F78D77CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"836C5AC9-463F-4703-81B9-7B5484F47A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED14811-8F49-4796-BADD-DB7973EC32DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4EB2830-ADE5-4C87-964E-16748BF88EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0284FD-2933-4160-80D2-53B32CD73287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9AB963A-7284-433F-9890-5AE402E4E000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDEFF7A-D964-4D9A-93BF-41E9D16EA793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C434153-911C-4F07-ADD0-0EAB47F96E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8183B043-8B96-4A8B-A5C9-544D4F1CED8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE349AB-44CB-4263-80CE-59DFD572B363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB55DF6-567F-4B6A-81E1-9013914416D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80727B0B-AB5E-46CC-9DDF-F319C2D9B242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0755962-2D5F-41E6-9BDB-C2ECBCCD2818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBAADB5-FA32-4CF9-A4B2-51EEA300B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A202FDAD-D757-4850-9D1E-C31B0F3BA718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A345D7-DFC0-4E0D-AAAB-8206C35F63D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4069EF5-DC7D-4487-8636-AC2EAB17BAC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73DF3A5C-F1D9-468E-BD08-5E2578898DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0858AE44-4B0A-4941-B4A8-937B557D1448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979C84FF-CB21-4819-B3CA-1A55FDF20BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94709B39-C394-4B44-A362-9429F4CB9D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4526AC-6BCC-43A5-B501-263D0ED0655B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E04FF6B4-CD1C-4AC1-B286-D6AB705D680B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAFA0C8-1349-43A4-BDAC-3B5A601B9FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA130B1-DD20-4E98-963F-61E85A09E29E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AAC9B73-5020-47C9-803E-ABB6162AADE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A6B7B5-3AC9-4442-BD91-3783C2B4235C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72F5C09-520B-486C-AD9A-9CBBFE6487CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"097DED37-D3F3-45C4-B131-1C4294406722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A4F607-0A9D-4F84-B50D-28C54E6EDC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C689CAF-632A-4FF2-8C86-541EEDD574E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0ACF5B-BBA9-4B6C-B19D-B8AEF7212781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C8254-73DC-4AFA-A250-A8192DC917F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D344FA12-3C5F-418B-9209-EA8BDD230074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C3A62A-C6F6-4B2E-A254-CDA12BD34DBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073A0AFF-C5C6-422E-BD63-2353AA4B58E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B5DA29-4139-405D-8AA8-23FAECBBC5CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F4D15D-6D2A-4730-B7CF-21284E92FEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A0C6AB-813F-4417-A98E-33FBB7AAB939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815ABF0E-ED94-4426-8889-D3C2AECACC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894612F1-8C51-4F66-AFE7-D8077F63E562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FD3D1E-08F8-4C7F-876C-47E88386B83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C068E27-A3DD-4FD2-81FB-2CFEC3C047CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E21A12E6-0802-4BDC-AF71-50D7D0433B87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7EE44A-7D8B-41A5-82A6-04AEE50278CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6862529A-1AE5-4E2D-A4B0-E351D1900C64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6B6711-0F75-4FEA-8917-04391FC9D378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC0249C-3CFC-4CD3-9481-9F6BE1FC5E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE639D9-0B1E-4DFB-B275-D11665FDA4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35E9C41-0F2A-4790-B996-8EC00FA863F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BAB268-3A70-4422-9C6C-49E6453D750D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5960F1-DDA9-4885-952F-450EC00B5C9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E725D449-BBC2-40E3-BF53-D9BF7B4F57D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10975CB-56EB-44D0-BDEF-60484B6BD85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EE56C0F-0AF4-45CF-ACA2-0E583BBB3187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A4A1AC-ED08-4EFE-A826-1BB1B5CAB34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF9D7AD6-6BDB-4519-B9F8-3181E21850FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B061FF9A-0D00-429D-9B2F-14EEA41E7A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CB0260-2A96-41A8-81A0-8E9722B22D87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE037065-9E33-4A5A-8188-1F086D7BE394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70200031-5902-416D-A140-DC2CDFDAF683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575C5F15-2C16-4B39-A718-1641DDD88F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7BFD7E-9B3F-4D63-BEBC-16F22DA6F8E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42631437-772B-45E0-A1F3-5D9E2FC77D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9E62EF-E21F-421F-9A57-54A551CEC441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871E046E-013A-4E10-9457-4D1F407519EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E4B06F-AD55-4D61-B966-B38B854C0A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19817731-42C2-4745-88F2-D27258FC7DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77479EEE-F81B-4653-8FAD-0AFBA3C71B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0208619E-9179-46D9-8E47-6CB5B4046DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FBAE2A2-B7CB-45F6-A84C-5B9B742A0B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC16904-03FC-42B2-89F0-CA0D59A5FB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E3980D1-54F1-4C2F-B140-B2F18D8958A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C845718-520A-42CB-9BA7-00723694A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAB7BF51-DD1A-41E1-B5E5-02A6BADC30DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431DA557-0977-43C2-8DEF-127B1BAA9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"733C0A5D-3A0A-4449-9DE0-BD06D4942799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E5DAD5-465A-4A53-856A-1F674723EB00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3FE37F4-C8E6-42CC-A799-563637F6B85A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F9DD05-E521-45D3-994E-0400DA0070BD\"}]}]}],\"references\":[{\"url\":\"http://support.ntp.org/bin/view/Main/NtpBug3010\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/88189\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035705\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.