Description
ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1948-1 | New ntp packages fix denial of service |
Debian DSA |
DSA-1992-1 | New chrony packages fix denial of service |
Ubuntu USN |
USN-867-1 | Ntp vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:31:10.550Z
Reserved: 2009-10-05T00:00:00.000Z
Link: CVE-2009-3563
No data.
Status : Modified
Published: 2009-12-09T18:30:00.390
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-3563
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN