Total vulnerabilities in the database
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
Software | From | Fixed in |
---|---|---|
ntp / ntp | - | 4.2.7.x |