MEDIUM · 5.0

CVE-2014-9296

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended associa...

Vulnerability Description

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
NtpNtp<= 4.2.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9296?

CVE-2014-9296 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended associa...

How severe is CVE-2014-9296?

CVE-2014-9296 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9296?

Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.