MEDIUM · 5.8

CVE-2014-9750

ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon...

Vulnerability Description

ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.

CVSS Score

5.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:P
Confidentiality
PARTIAL
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
NtpNtp>= 4.2.0, < 4.2.8
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Workstation6.0
DebianDebian Linux7.0
OracleLinux7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-9750?

CVE-2014-9750 is a vulnerability with a CVSS score of 5.8 (MEDIUM). ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon...

How severe is CVE-2014-9750?

CVE-2014-9750 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-9750?

Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation, Debian Debian Linux.