Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2016-4954

CVE information

Published

7 years ago

Last Modified

5 months ago

CVSSv2.0 Severity

Medium

CVSSv3.1 Severity

High

Impact Analysis

Description

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

CVSSv3.1 Score

Severity
High
Base Score
7.5/10
Exploit Score
3.9/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
3.6/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
  Yes
4.2.0 4.2.8
cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
  Yes
4.3.0 4.3.93
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
  Yes
- -
cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
  Yes
- -
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  Yes
- -

References