The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-192-1 | ntp security update |
![]() |
DSA-3223-1 | ntp security update |
![]() |
EUVD-2015-1924 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer. |
![]() |
USN-2567-1 | NTP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:54:16.094Z
Reserved: 2015-02-17T00:00:00
Link: CVE-2015-1799

No data.

Status : Deferred
Published: 2015-04-08T10:59:05.717
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-1799


No data.