Total vulnerabilities in the database
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
Software | From | Fixed in |
---|---|---|
ntp / ntp | 4.2.8-p5 | 4.2.8-p5.x |
ntp / ntp | 4.2.8-p9 | 4.2.8-p9.x |
ntp / ntp | 4.2.8-p4 | 4.2.8-p4.x |
ntp / ntp | 4.2.8-p7 | 4.2.8-p7.x |
ntp / ntp | 4.2.8-p8 | 4.2.8-p8.x |
ntp / ntp | 4.2.8-p6 | 4.2.8-p6.x |
ntp / ntp | 4.2.8-p10 | 4.2.8-p10.x |
synology / router_manager | 1.1 | 1.1.x |
synology / diskstation_manager | 6.0 | 6.0.x |
synology / diskstation_manager | 5.2 | 5.2.x |
synology / diskstation_manager | 6.1 | 6.1.x |
slackware / slackware_linux | 14.1 | 14.1.x |
slackware / slackware_linux | 14.0 | 14.0.x |
slackware / slackware_linux | 14.2 | 14.2.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 17.10 | 17.10.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |