- Home
- CVEs with nessus.description==Yihan+Lian+discovered+that+NTP+incorrectly+handled+certain+large+request+data+values.+A+remote+attacker+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+This+issue+only+affected+Ubuntu+16.04+LTS.+%28CVE-2016-2519%29%0A%0AMiroslav+Lichvar+discovered+that+NTP+incorrectly+handled+certain+spoofed+addresses+when+performing+rate+limiting.+A+remote+attacker+could+possibly+use+this+issue+to+perform+a+denial+of+service.+This+issue+only+affected+Ubuntu+14.04+LTS%2C+Ubuntu+16.04+LTS%2C+and+Ubuntu+16.10.+%28CVE-2016-7426%29%0A%0AMatthew+Van+Gundy+discovered+that+NTP+incorrectly+handled+certain+crafted+broadcast+mode+packets.+A+remote+attacker+could+possibly+use+this+issue+to+perform+a+denial+of+service.+This+issue+only+affected+Ubuntu+14.04+LTS%2C+Ubuntu+16.04+LTS%2C+and+Ubuntu+16.10.+%28CVE-2016-7427%2C+CVE-2016-7428%29%0A%0AMiroslav+Lichvar+discovered+that+NTP+incorrectly+handled+certain+responses.+A+remote+attacker+could+possibly+use+this+issue+to+perform+a+denial+of+service.+This+issue+only+affected+Ubuntu+14.04+LTS%2C+Ubuntu+16.04+LTS%2C+and+Ubuntu+16.10.+%28CVE-2016-7429%29%0A%0ASharon+Goldberg+and+Aanchal+Malhotra+discovered+that+NTP+incorrectly+handled+origin+timestamps+of+zero.+A+remote+attacker+could+possibly+use+this+issue+to+bypass+the+origin+timestamp+protection+mechanism.%0AThis+issue+only+affected+Ubuntu+16.10.+%28CVE-2016-7431%29%0A%0ABrian+Utterback%2C+Sharon+Goldberg+and+Aanchal+Malhotra+discovered+that+NTP+incorrectly+performed+initial+sync+calculations.+This+issue+only+applied+to+Ubuntu+16.04+LTS+and+Ubuntu+16.10.+%28CVE-2016-7433%29%0A%0AMagnus+Stubman+discovered+that+NTP+incorrectly+handled+certain+mrulist+queries.+A+remote+attacker+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+This+issue+only+affected+Ubuntu+16.04+LTS+and+Ubuntu+16.10.+%28CVE-2016-7434%29%0A%0AMatthew+Van+Gund+discovered+that+NTP+incorrectly+handled+origin+timestamp+checks.+A+remote+attacker+could+possibly+use+this+issue+to+perform+a+denial+of+service.+This+issue+only+affected+Ubuntu+Ubuntu+16.10%2C+and+Ubuntu+17.04.+%28CVE-2016-9042%29%0A%0AMatthew+Van+Gundy+discovered+that+NTP+incorrectly+handled+certain+control+mode+packets.+A+remote+attacker+could+use+this+issue+to+set+or+unset+traps.+This+issue+only+applied+to+Ubuntu+14.04+LTS%2C+Ubuntu+16.04+LTS+and+Ubuntu+16.10.+%28CVE-2016-9310%29%0A%0AMatthew+Van+Gundy+discovered+that+NTP+incorrectly+handled+the+trap+service.+A+remote+attacker+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+This+issue+only+applied+to+Ubuntu+14.04+LTS%2C+Ubuntu+16.04+LTS+and+Ubuntu+16.10.+%28CVE-2016-9311%29%0A%0AIt+was+discovered+that+NTP+incorrectly+handled+memory+when+processing+long+variables.+A+remote+authenticated+user+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.%0A%28CVE-2017-6458%29%0A%0AIt+was+discovered+that+NTP+incorrectly+handled+memory+when+processing+long+variables.+A+remote+authenticated+user+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+This+issue+only+applied+to+Ubuntu+16.04+LTS%2C+Ubuntu+16.10+and+Ubuntu+17.04.%0A%28CVE-2017-6460%29%0A%0AIt+was+discovered+that+the+NTP+legacy+DPTS+refclock+driver+incorrectly+handled+the+%2Fdev%2Fdatum+device.+A+local+attacker+could+possibly+use+this+issue+to+cause+a+denial+of+service.+%28CVE-2017-6462%29%0A%0AIt+was+discovered+that+NTP+incorrectly+handled+certain+invalid+settings+in+a+%3Aconfig+directive.+A+remote+authenticated+user+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+%28CVE-2017-6463%29%0A%0AIt+was+discovered+that+NTP+incorrectly+handled+certain+invalid+mode+configuration+directives.+A+remote+authenticated+user+could+possibly+use+this+issue+to+cause+NTP+to+crash%2C+resulting+in+a+denial+of+service.+%28CVE-2017-6464%29.%0A%0ANote+that+Tenable+Network+Security+has+extracted+the+preceding+description+block+directly+from+the+Ubuntu+security+advisory.+Tenable+has+attempted+to+automatically+clean+and+format+it+as+much+as+possible+without+introducing+additional+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top