NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3349-1 | NTP vulnerabilities |
Ubuntu USN |
USN-3707-2 | NTP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:57:47.647Z
Reserved: 2016-09-09T00:00:00
Link: CVE-2016-7426
No data.
Status : Deferred
Published: 2017-01-13T16:59:00.323
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-7426
OpenCVE Enrichment
No data.
Ubuntu USN