vulnerability
NTP: Improper Input Validation (CVE-2015-7703)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jul 24, 2017 | Feb 23, 2023 | Mar 1, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jul 24, 2017
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
Solution(s)
ntp-upgrade-4_2_8ntp-upgrade-4_3_77
References
- BID-77278
- CVE-2015-7703
- https://attackerkb.com/topics/CVE-2015-7703
- DEBIAN-DSA-3388
- REDHAT-RHSA-2016:0780
- REDHAT-RHSA-2016:2583
- URL-http://rhn.redhat.com/errata/RHSA-2016-0780.html
- URL-http://rhn.redhat.com/errata/RHSA-2016-2583.html
- URL-http://support.ntp.org/bin/view/Main/NtpBug2902
- URL-http://www.debian.org/security/2015/dsa-3388
- URL-http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- URL-http://www.securityfocus.com/bid/77278
- URL-http://www.securitytracker.com/id/1033951
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1254547
- URL-https://security.gentoo.org/glsa/201607-15
- URL-https://security.netapp.com/advisory/ntap-20171004-0001/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.