Search CVE reports


Toggle filters

11 – 20 of 110 results


CVE-2020-11868

Low priority
Needs evaluation

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a...

2 affected packages

ntp, ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
ntpsec Not affected Not affected Not affected Not affected
Show less packages

CVE-2019-8936

Medium priority

Some fixes available 6 of 9

NTP through 4.2.8p12 has a NULL Pointer Dereference.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Fixed Fixed Fixed
Show less packages

CVE-2019-6445

Medium priority
Fixed

An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Fixed
Show less packages

CVE-2019-6444

Medium priority
Fixed

An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Fixed
Show less packages

CVE-2019-6443

Medium priority
Fixed

An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Fixed
Show less packages

CVE-2019-6442

Medium priority
Fixed

An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and...

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Fixed
Show less packages

CVE-2018-8956

Low priority
Needs evaluation

ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be...

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2018-7185

Low priority
Fixed

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an...

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Fixed
Show less packages

CVE-2018-7184

Low priority
Fixed

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the...

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Fixed
Show less packages

CVE-2018-7183

Medium priority
Fixed

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Fixed
Show less packages