Total vulnerabilities in the database
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
Software | From | Fixed in |
---|---|---|
ntp / ntp | 4.2.8-p5 | 4.2.8-p5.x |
ntp / ntp | 4.2.8-p2 | 4.2.8-p2.x |
ntp / ntp | 4.2.8-p3 | 4.2.8-p3.x |
ntp / ntp | 4.2.8-p9 | 4.2.8-p9.x |
ntp / ntp | 4.2.8-p4 | 4.2.8-p4.x |
ntp / ntp | 4.2.8-p7 | 4.2.8-p7.x |
ntp / ntp | 4.2.8-p8 | 4.2.8-p8.x |
ntp / ntp | - | 4.2.7.x |
ntp / ntp | 4.2.8-p6 | 4.2.8-p6.x |
ntp / ntp | 4.2.8-p1 | 4.2.8-p1.x |
ntp / ntp | 4.2.8-p10 | 4.2.8-p10.x |
ntp / ntp | 4.2.8-p3-rc3 | 4.2.8-p3-rc3.x |
ntp / ntp | 4.2.8-p3-rc2 | 4.2.8-p3-rc2.x |
ntp / ntp | 4.2.8-p3-rc1 | 4.2.8-p3-rc1.x |
ntp / ntp | 4.2.8-p2-rc3 | 4.2.8-p2-rc3.x |
ntp / ntp | 4.2.8-p2-rc2 | 4.2.8-p2-rc2.x |
ntp / ntp | 4.2.8-p2-rc1 | 4.2.8-p2-rc1.x |
ntp / ntp | 4.2.8-p1-rc2 | 4.2.8-p1-rc2.x |
ntp / ntp | 4.2.8-p1-rc1 | 4.2.8-p1-rc1.x |
ntp / ntp | 4.2.8-p1-beta5 | 4.2.8-p1-beta5.x |
ntp / ntp | 4.2.8-p1-beta4 | 4.2.8-p1-beta4.x |
ntp / ntp | 4.2.8-p1-beta3 | 4.2.8-p1-beta3.x |
ntp / ntp | 4.2.8-p1-beta2 | 4.2.8-p1-beta2.x |
ntp / ntp | 4.2.8-p1-beta1 | 4.2.8-p1-beta1.x |
ntp / ntp | 4.2.8-p11 | 4.2.8-p11.x |
ntp / ntp | 4.2.8-p12 | 4.2.8-p12.x |
ntp / ntp | 4.2.8-p13 | 4.2.8-p13.x |
ntp / ntp | 4.3.98 | 4.3.100 |
ntp / ntp | 4.2.8 | 4.2.8.x |
redhat / enterprise_linux | 7.0 | 7.0.x |
netapp / virtual_storage_console | 7.2 | 7.2.x |
netapp / vasa_provider_for_clustered_data_ontap | 7.2 | 7.2.x |
debian / debian_linux | 8.0 | 8.0.x |
opensuse / leap | 15.1 | 15.1.x |
opensuse / leap | 15.2 | 15.2.x |