Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2019-13946

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface. This could lead to a denial of service condition due to lack of memory for devices that include a vulnerable version of the stack. The security vulnerability could be exploited by an attacker with network access to an affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the device.
0
Attacker Value
Unknown

CVE-2016-9042

Disclosure Date: June 04, 2018 (last updated November 08, 2023)
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
Attacker Value
Unknown

CVE-2017-2681

Disclosure Date: May 11, 2017 (last updated September 10, 2024)
Specially crafted PROFINET DCP packets sent on a local Ethernet segment (Layer 2) to an affected product could cause a denial of service condition of that product. Human interaction is required to recover the system. PROFIBUS interfaces are not affected.
Attacker Value
Unknown

CVE-2017-2680

Disclosure Date: May 11, 2017 (last updated September 10, 2024)
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
Attacker Value
Unknown

CVE-2017-6458

Disclosure Date: March 27, 2017 (last updated November 08, 2023)
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
Attacker Value
Unknown

CVE-2016-2518

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
Attacker Value
Unknown

CVE-2016-4956

Disclosure Date: July 05, 2016 (last updated November 08, 2023)
ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
Attacker Value
Unknown

CVE-2016-4953

Disclosure Date: July 05, 2016 (last updated November 25, 2024)
ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
Attacker Value
Unknown

CVE-2016-4954

Disclosure Date: July 05, 2016 (last updated November 08, 2023)
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
Attacker Value
Unknown

CVE-2016-4955

Disclosure Date: July 05, 2016 (last updated November 08, 2023)
ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.