Handler on Duty: Xavier Mertens
Threat Level: green
Thinking...
|
|
||||||||||||||||||||||||||||||||||
| Submitted By | Date |
|---|---|
| Comment | |
| 2014-07-05 00:42:34 | |
| ntp can be used for amplificating ddos attacks: http://nsfocusblog.com/2014/06/24/nsfocus-releases-ntp-amplification-threat-update/ | |
| Kutbuddin Trunkwala | 2005-04-19 15:50:12 |
| Two more vulnerabilities pertaining to NTP. http://www.securityfocus.com/bid/6356 Only HP-UX is vulnerable http://www.securityfocus.com/bid/10980 Several Microsoft products/versions affected | |
| Derek Shull - Christian Cyber Security Service Owner | 2005-03-26 02:48:26 |
| This is used by Sobig virus. http://www.microsoft.com/isaserver/support/prevent/sobig.asp#aa | |
| CVE # | Description |
|---|---|
| CVE-2015-7703 | The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command. |
| CVE-2016-9042 | An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition. |
