vulnerability
NTP: Improper Access Control (CVE-2015-8140)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | Jan 30, 2017 | Feb 23, 2023 | Mar 1, 2023 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Jan 30, 2017
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
Solution
ntp-upgrade-latest
References
- CERT-VN-718152
- CVE-2015-8140
- https://attackerkb.com/topics/CVE-2015-8140
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- URL-http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
- URL-http://support.ntp.org/bin/view/Main/NtpBug2947
- URL-http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
- URL-http://www.securitytracker.com/id/1034782
- URL-https://bto.bluecoat.com/security-advisory/sa113
- URL-https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
- URL-https://security.gentoo.org/glsa/201607-15
- URL-https://security.netapp.com/advisory/ntap-20200204-0003/
- URL-https://www.kb.cert.org/vuls/id/718152

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.