Show filters
62 Total Results
Displaying 1-10 of 62
Sort by:
Attacker Value
Unknown
CVE-2015-7871
Disclosure Date: August 07, 2017 (last updated November 26, 2024)
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
1
Attacker Value
Unknown
CVE-2023-26555
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.
0
Attacker Value
Unknown
CVE-2023-26554
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
0
Attacker Value
Unknown
CVE-2023-26553
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
0
Attacker Value
Unknown
CVE-2023-26552
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
0
Attacker Value
Unknown
CVE-2023-26551
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp<cpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
0
Attacker Value
Unknown
CVE-2020-15025
Disclosure Date: June 24, 2020 (last updated November 08, 2023)
ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
0
Attacker Value
Unknown
CVE-2020-13817
Disclosure Date: June 04, 2020 (last updated November 28, 2024)
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
0
Attacker Value
Unknown
CVE-2018-8956
Disclosure Date: May 06, 2020 (last updated October 06, 2023)
ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.
0
Attacker Value
Unknown
CVE-2020-11868
Disclosure Date: April 17, 2020 (last updated November 27, 2024)
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
0