fkie_cve-2015-7871
Vulnerability from fkie_nvd
Published
2017-08-07 20:29
Modified
2025-04-20 01:37
Severity ?
Summary
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ntp | ntp | * | |
| ntp | ntp | * | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.5 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| ntp | ntp | 4.2.8 | |
| debian | debian_linux | 7.0 | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| netapp | oncommand_balance | - | |
| netapp | oncommand_performance_manager | - | |
| netapp | oncommand_unified_manager | - | |
| netapp | clustered_data_ontap | - | |
| netapp | data_ontap | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418",
"versionEndExcluding": "4.2.8",
"versionStartIncluding": "4.2.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79494F07-6081-497D-8A2D-B05486599EAE",
"versionEndExcluding": "4.3.77",
"versionStartIncluding": "4.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p186:*:*:*:*:*:*",
"matchCriteriaId": "D5D4B9E2-A28F-4E43-980C-698F833D03DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p187:*:*:*:*:*:*",
"matchCriteriaId": "3C78C23F-3125-4CAB-B75D-EA105A5C5D24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p188:*:*:*:*:*:*",
"matchCriteriaId": "0A5267AF-4F05-4124-89B2-AC705C181FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p189:*:*:*:*:*:*",
"matchCriteriaId": "00E07D52-2DEE-4ACF-AA82-4DD108D25B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p190:*:*:*:*:*:*",
"matchCriteriaId": "A0FB2BFD-AE6A-46D5-828A-0CAE5E445B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p191:*:*:*:*:*:*",
"matchCriteriaId": "7A25BD2C-AF41-4438-B32D-44BD331E8D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p192:*:*:*:*:*:*",
"matchCriteriaId": "10D2C131-7219-4416-9A3F-262615760DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p193:*:*:*:*:*:*",
"matchCriteriaId": "7EE354F9-58B9-4DCD-91EC-030F079EC8E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p194:*:*:*:*:*:*",
"matchCriteriaId": "3E129E07-8B34-45C5-BDAC-89B8ECA960DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p195:*:*:*:*:*:*",
"matchCriteriaId": "B826EAE0-D9BA-4C7D-A5BE-561E5AB35664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p196:*:*:*:*:*:*",
"matchCriteriaId": "931932A6-D19A-4B85-A90A-BA52D9AFA9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p197:*:*:*:*:*:*",
"matchCriteriaId": "516748AA-9E25-4C2C-8D58-7E75D373F6D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p198:*:*:*:*:*:*",
"matchCriteriaId": "61DC3B1A-7264-44F2-915A-716FD133E5C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p199:*:*:*:*:*:*",
"matchCriteriaId": "DFD406BC-AFDE-4425-9C63-7D58ADCC24C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p200:*:*:*:*:*:*",
"matchCriteriaId": "86F9B4C0-0504-43ED-B64C-894E4B4E77E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p201:*:*:*:*:*:*",
"matchCriteriaId": "A2A9EB64-BB4A-4E4E-994B-0145AD134588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p202:*:*:*:*:*:*",
"matchCriteriaId": "655A7FF1-672A-490F-9E41-0AA40A1DEFEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*",
"matchCriteriaId": "EA207F59-B630-4BBB-9CD7-BA7B64581907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*",
"matchCriteriaId": "06AE2082-B219-4E94-89E8-E1328224C9D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*",
"matchCriteriaId": "6E0F5656-3E41-4568-A810-F2CFA3677488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*",
"matchCriteriaId": "934152EB-5F5A-4BD8-B832-3B342551F9AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*",
"matchCriteriaId": "6936BEB5-B765-45C5-B671-A9D0CC4988C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*",
"matchCriteriaId": "BAA1E4CD-45EE-4814-AC6B-DE786C5B3B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*",
"matchCriteriaId": "95779DD0-C768-4B1C-A720-23BE19606B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*",
"matchCriteriaId": "1B035472-2B64-4BE4-8D25-6E31937641E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*",
"matchCriteriaId": "3CE88876-F0BB-43A1-9A4A-91C5D6FFC02B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*",
"matchCriteriaId": "4E4BE466-B479-47BA-9A1F-F0184E252103",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*",
"matchCriteriaId": "4E6D7F8F-EF71-44E6-B33F-E0265266C616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*",
"matchCriteriaId": "AC47FB1E-289A-4AA1-9DF1-0CEE13C9335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*",
"matchCriteriaId": "B7BC8DB4-E715-44F1-8759-0414613C9F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*",
"matchCriteriaId": "5AF5BC27-EE65-4FB4-975E-FA3933B3202C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*",
"matchCriteriaId": "795D50A9-41E5-40CE-88E9-391229607301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*",
"matchCriteriaId": "1DE4338B-F5B3-4410-886D-0F28A7ECE824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*",
"matchCriteriaId": "B1463DC6-D0C7-46E6-8418-B7900C99D079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*",
"matchCriteriaId": "C5B7AA5B-2BD5-4F19-A8BB-DF4677995602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*",
"matchCriteriaId": "DBCF724B-5018-4794-97D9-D8EDC2F04060",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*",
"matchCriteriaId": "2A62EAF1-3D51-456F-BBE3-A2E8CBE7960D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*",
"matchCriteriaId": "67D86D6C-A8A3-4CD4-B1A5-57941B51C732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*",
"matchCriteriaId": "E793243F-4179-46C9-B422-DC3D6E688B2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*",
"matchCriteriaId": "6EAC9B6E-3A88-4DED-A5D4-862E076620BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*",
"matchCriteriaId": "AD8E8B74-6E16-47FF-A019-54B0438A8CE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*",
"matchCriteriaId": "3C210EFA-7BF2-4EEE-B59C-F3C75743E182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*",
"matchCriteriaId": "23A9CDE2-4520-4542-93B0-74A01E919597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*",
"matchCriteriaId": "94A7790A-DACE-4F02-B2FF-2C851EFD9717",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*",
"matchCriteriaId": "5ED47A47-3CB2-45CC-8147-CFFE0B93D966",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*",
"matchCriteriaId": "4FC2172C-73BD-441D-9963-5C9E89FB68F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*",
"matchCriteriaId": "485C8744-A185-46EB-B27F-8A42ED76964B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*",
"matchCriteriaId": "C01153E2-A4E3-4EF9-A33E-1026F578CB44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*",
"matchCriteriaId": "505CE414-C5E5-4251-9F02-A8A0DA6C0E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*",
"matchCriteriaId": "607E83FB-FDB7-49CA-9DA9-B8DA43C3DF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*",
"matchCriteriaId": "864BA14B-B357-4ADD-BCE1-B2EAE4D299FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*",
"matchCriteriaId": "2856AAB8-172F-4657-85FF-9FFB698C4457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*",
"matchCriteriaId": "7C2B8290-8AD6-4EDD-9736-730DD33CA73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*",
"matchCriteriaId": "A509FC81-ABFD-4CE1-ABD6-C47ECCF97892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*",
"matchCriteriaId": "7111A1FB-142C-4538-BC96-F71AEDC0FB4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*",
"matchCriteriaId": "FB54C36C-F07A-4F99-A093-8EF10689E1C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*",
"matchCriteriaId": "CD57B6E4-9947-4790-BCAF-30B37C7CB837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*",
"matchCriteriaId": "232170D9-923D-4DA5-9A7D-6A5BDCD37165",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*",
"matchCriteriaId": "A0BE1B30-DB6E-4029-8212-035449CEE22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*",
"matchCriteriaId": "3181F3BF-8704-4D54-ABC4-CB68C89AF52D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*",
"matchCriteriaId": "E61A5F5E-8DCC-4809-A2DE-E39C8E01976F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*",
"matchCriteriaId": "1D2E80CD-0EAA-423B-B885-EDC5BFE962BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*",
"matchCriteriaId": "11F45456-692B-415D-BDBF-BA639AA622BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*",
"matchCriteriaId": "FCEF3E6A-48C3-4A00-B286-58E642DE5928",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*",
"matchCriteriaId": "8CE352E5-DFFC-4580-9D5E-95EE7A5C2BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*",
"matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*",
"matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*",
"matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*",
"matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*",
"matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*",
"matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*",
"matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*",
"matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*",
"matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*",
"matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*",
"matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*",
"matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*",
"matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*",
"matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*",
"matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*",
"matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*",
"matchCriteriaId": "212E1878-1B9A-4CB4-A1CE-EAD60B867161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*",
"matchCriteriaId": "95B173E0-1475-4F8D-A982-86F36BE3DD4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FED6CAE-D97F-49E0-9D00-1642A3A427B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*",
"matchCriteriaId": "392A1364-2739-450D-9E19-DFF93081C2C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication."
},
{
"lang": "es",
"value": "Los paquetes Crypto-NAK en ntpd en NTP 4.2.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permiten que atacantes remotos eludan la autenticaci\u00f3n."
}
],
"id": "CVE-2015-7871",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-07T20:29:00.997",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://support.ntp.org/bin/view/Main/NtpBug2941"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3388"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/77287"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1033951"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274265"
},
{
"source": "cve@mitre.org",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201604-03"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201607-15"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://support.ntp.org/bin/view/Main/NtpBug2941"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/77287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1033951"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201604-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://security.gentoo.org/glsa/201607-15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20171004-0001/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…