Description
The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-335-1 | ntp security update |
Debian DSA |
DSA-3388-1 | ntp security update |
EUVD |
EUVD-2015-5216 | The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet. |
Ubuntu USN |
USN-2783-1 | NTP vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Novell
Subscribe
Leap
Subscribe
Ntp
Subscribe
Ntp
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Linux
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Siemens
Subscribe
Tim 4r-id Dnp3
Subscribe
Tim 4r-id Dnp3 Firmware
Subscribe
Tim 4r-ie
Subscribe
Tim 4r-ie Firmware
Subscribe
Suse
Subscribe
Linux Enterprise Debuginfo
Subscribe
Linux Enterprise Server
Subscribe
Manager
Subscribe
Manager Proxy
Subscribe
Openstack Cloud
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:08.551Z
Reserved: 2015-07-01T00:00:00.000Z
Link: CVE-2015-5219
No data.
Status : Deferred
Published: 2017-07-21T14:29:00.867
Modified: 2025-04-20T01:37:25.860
Link: CVE-2015-5219
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN