Description
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3388-1 | ntp security update |
EUVD |
EUVD-2014-9557 | The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address. |
References
History
No history.
Subscriptions
Apple
Subscribe
Macos
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Ntp
Subscribe
Ntp
Subscribe
Oracle
Subscribe
Linux
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:55:04.656Z
Reserved: 2015-10-04T00:00:00.000Z
Link: CVE-2014-9751
No data.
Status : Deferred
Published: 2015-10-06T01:59:02.610
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9751
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD