NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
| Software | From | Fixed in |
|---|---|---|
| ntp / ntp | 4.2.8-p8 | 4.2.8-p8.x |