Vulnerability Description
ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
CVSS Score
5.3
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | <= 4.2.8 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2946Vendor Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Third Party Advisory
- http://www.securityfocus.com/bid/82105Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034782Third Party AdvisoryVDB Entry
- https://bto.bluecoat.com/security-advisory/sa113Third Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
FAQ
What is CVE-2015-8139?
CVE-2015-8139 is a vulnerability with a CVSS score of 5.3 (MEDIUM). ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
How severe is CVE-2015-8139?
CVE-2015-8139 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8139?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.