Vulnerability Description
NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | <= 4.2.8 |
Related Weaknesses (CWE)
References
- http://support.ntp.org/bin/view/Main/NtpBug3011Vendor Advisory
- http://www.debian.org/security/2016/dsa-3629
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- http://www.securityfocus.com/bid/88180Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1035705
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
- https://security.gentoo.org/glsa/201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://www.kb.cert.org/vuls/id/718152Third Party AdvisoryUS Government Resource
- http://support.ntp.org/bin/view/Main/NtpBug3011Vendor Advisory
- http://www.debian.org/security/2016/dsa-3629
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- http://www.securityfocus.com/bid/88180Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1035705
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
FAQ
What is CVE-2016-2516?
CVE-2016-2516 is a vulnerability with a CVSS score of 5.3 (MEDIUM). NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directiv...
How severe is CVE-2016-2516?
CVE-2016-2516 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2516?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.