Handler on Duty: Jan Kopriva
Threat Level: green
Loading...
|
|
Submitted By | Date |
---|---|
Comment | |
2014-07-05 00:42:34 | |
ntp can be used for amplificating ddos attacks: http://nsfocusblog.com/2014/06/24/nsfocus-releases-ntp-amplification-threat-update/ | |
Kutbuddin Trunkwala | 2005-04-19 15:50:12 |
Two more vulnerabilities pertaining to NTP. http://www.securityfocus.com/bid/6356 Only HP-UX is vulnerable http://www.securityfocus.com/bid/10980 Several Microsoft products/versions affected | |
Derek Shull - Christian Cyber Security Service Owner | 2005-03-26 02:48:26 |
This is used by Sobig virus. http://www.microsoft.com/isaserver/support/prevent/sobig.asp#aa |
CVE # | Description |
---|---|
CVE-2015-7703 | |
CVE-2016-9042 | An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition. |