Description
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3349-1 | NTP vulnerabilities |
Ubuntu USN |
USN-3707-2 | NTP vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Hpe
Subscribe
Hpux-ntp
Subscribe
Ntp
Subscribe
Ntp
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:57:47.647Z
Reserved: 2016-09-09T00:00:00.000Z
Link: CVE-2016-7426
No data.
Status : Deferred
Published: 2017-01-13T16:59:00.323
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-7426
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN