vulnerability
RHSA-2016:0063: ntp security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | 2016-01-25 | 2016-01-29 | 2017-10-30 |
Description
The Network Time Protocol (NTP) is used to synchronize a computer's timewith a referenced time source.It was discovered that ntpd as a client did not correctly check theoriginate timestamp in received packets. A remote attacker could use thisflaw to send a crafted packet to an ntpd client that would effectivelydisable synchronization with the server, or push arbitrary offset/delaymeasurements to modify the time on the client. (CVE-2015-8138)All ntp users are advised to upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing theupdate, the ntpd daemon will restart automatically.
Solution(s)

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.