Max CVSS | 7.1 | Min CVSS | 1.8 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-1798 | 1.8 |
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting t
|
12-02-2023 - 23:15 | 08-04-2015 - 10:59 | |
CVE-2016-7433 | 5.0 |
NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
|
16-07-2021 - 13:15 | 13-01-2017 - 16:59 | |
CVE-2016-7431 | 5.0 |
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
|
12-07-2021 - 17:15 | 13-01-2017 - 16:59 | |
CVE-2016-7434 | 4.3 |
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
|
18-06-2020 - 18:20 | 13-01-2017 - 16:59 | |
CVE-2016-7426 | 4.3 |
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses wit
|
18-06-2020 - 18:14 | 13-01-2017 - 16:59 | |
CVE-2016-9310 | 6.4 |
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
|
24-01-2019 - 11:29 | 13-01-2017 - 16:59 | |
CVE-2016-7428 | 3.3 |
ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
|
24-01-2019 - 11:29 | 13-01-2017 - 16:59 | |
CVE-2016-7427 | 3.3 |
The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
|
24-01-2019 - 11:29 | 13-01-2017 - 16:59 | |
CVE-2016-9311 | 7.1 |
ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
|
24-01-2019 - 11:29 | 13-01-2017 - 16:59 | |
CVE-2016-7429 | 4.3 |
NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface
|
05-01-2018 - 02:31 | 13-01-2017 - 16:59 | |
CVE-2015-1799 | 4.3 |
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial
|
05-01-2018 - 02:30 | 08-04-2015 - 10:59 | |
CVE-2016-9312 | 5.0 |
ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.
|
28-07-2017 - 01:29 | 13-01-2017 - 16:59 |