vulnerability
NTP: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2015-7854)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Aug 7, 2017 | Feb 23, 2023 | Mar 1, 2023 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Aug 7, 2017
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
Solutions
ntp-upgrade-4_2_8ntp-upgrade-4_3_77
References
- BID-77277
- CVE-2015-7854
- https://attackerkb.com/topics/CVE-2015-7854
- URL-http://support.ntp.org/bin/view/Main/NtpBug2921
- URL-http://www.securityfocus.com/bid/77277
- URL-http://www.securitytracker.com/id/1033951
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1274263
- URL-https://security.gentoo.org/glsa/201607-15
- URL-https://security.netapp.com/advisory/ntap-20171004-0001/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.