vulnerability
NTP: Improper Input Validation (CVE-2016-9042)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jun 4, 2018 | Feb 23, 2023 | Mar 1, 2023 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jun 4, 2018
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
Solution
ntp-upgrade-latest
References
- BID-97046
- CVE-2016-9042
- https://attackerkb.com/topics/CVE-2016-9042
- URL-http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html
- URL-http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- URL-http://seclists.org/fulldisclosure/2017/Nov/7
- URL-http://seclists.org/fulldisclosure/2017/Sep/62
- URL-http://www.securityfocus.com/archive/1/540403/100/0/threaded
- URL-http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded
- URL-http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
- URL-http://www.securityfocus.com/bid/97046
- URL-http://www.securitytracker.com/id/1038123
- URL-http://www.securitytracker.com/id/1039427
- URL-http://www.ubuntu.com/usn/USN-3349-1
- URL-https://bto.bluecoat.com/security-advisory/sa147
- URL-https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- URL-https://kc.mcafee.com/corporate/index?page=content&id=SB10201
- URL-https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
- URL-https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
- URL-https://support.apple.com/kb/HT208144
- URL-https://support.f5.com/csp/article/K39041624
- URL-https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- URL-https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- URL-https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.