Vulnerability Description
NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | 4.2.8 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html
- http://nwtime.org/ntp428p9_release/Release NotesVendor Advisory
- http://packetstormsecurity.com/files/140240/FreeBSD-Security-Advisory-FreeBSD-SA
- http://support.ntp.org/bin/view/Main/NtpBug3102Issue TrackingMitigationVendor Advisory
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_VulnerabilitiesVendor Advisory
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-ntpd-en
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/archive/1/539955/100/0/threaded
- http://www.securityfocus.com/archive/1/540254/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539955/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540254/100/0/threaded
- http://www.securityfocus.com/bid/94454
- http://www.securitytracker.com/id/1037354
- http://www.ubuntu.com/usn/USN-3349-1
- https://bto.bluecoat.com/security-advisory/sa139
FAQ
What is CVE-2016-7431?
CVE-2016-7431 is a vulnerability with a CVSS score of 5.3 (MEDIUM). NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
How severe is CVE-2016-7431?
CVE-2016-7431 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7431?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.