CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-7426 NTP.org ntpd Multiple Security Vulnerabilities

2016年11月30日 2470点热度 0人点赞 0条评论

漏洞类别:General remote services

漏洞等级:

漏洞信息

The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source.

This update fixes the following vulnerabilities:
- Trap crash. (CVE-2016-9311)
- Mode 6 unauthenticated trap information disclosure and DDoS vector. (CVE-2016-9310)
- Broadcast Mode Replay Prevention DoS. (CVE-2016-7427)
- Broadcast Mode Poll Interval Enforcement DoS. (CVE-2016-7428)
- Windows: ntpd DoS by oversized UDP packet. (CVE-2016-9312)
- Regression: 010-origin: Zero Origin Timestamp Bypass. (CVE-2016-7431)
- Null pointer dereference in _IO_str_init_static_internal(). (CVE-2016-7434)
- Interface selection attack. (CVE-2016-7429)
- Client rate limiting and server responses. (CVE-2016-7426)
- Reboot sync calculation problem. (CVE-2016-7433)

Affected Versions:
NTP versions prior to 4.2.8p9

漏洞危害

A remote unauthenticated attacker may be able to perform a denial of service on targeted system.

解决方案

User are advised to upgrade to the 4.2.8p9 or later version to fix the issues. Latest version can be downloaded from here

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ntp-4.2.8p9 or later

0day

标签: 暂无
最后更新:2016年12月1日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me