Vulnerability Description
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | >= 4.2.6, < 4.2.8 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Eus | 7.3 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Hpe | Hpux-Ntp | >= b.11.31, < c.4.2.8.2.0 |
Related Weaknesses (CWE)
References
- http://nwtime.org/ntp428p9_release/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0252.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug3071Issue TrackingMitigationVendor Advisory
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease NotesVendor Advisory
- http://www.securityfocus.com/bid/94451Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1037354Third Party AdvisoryVDB Entry
- https://bto.bluecoat.com/security-advisory/sa139Third Party Advisory
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_naThird Party Advisory
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.ascThird Party Advisory
- https://usn.ubuntu.com/3707-2/Third Party Advisory
- https://www.kb.cert.org/vuls/id/633847Third Party AdvisoryUS Government Resource
- http://nwtime.org/ntp428p9_release/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0252.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug3071Issue TrackingMitigationVendor Advisory
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesRelease NotesVendor Advisory
FAQ
What is CVE-2016-7426?
CVE-2016-7426 is a vulnerability with a CVSS score of 7.5 (HIGH). NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent re...
How severe is CVE-2016-7426?
CVE-2016-7426 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7426?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.