Description
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-5928 | The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication. |
Ubuntu USN |
USN-3096-1 | NTP vulnerabilities |
References
History
No history.
Subscriptions
Ntp
Subscribe
Ntp
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Opensuse
Subscribe
Oracle
Subscribe
Solaris
Subscribe
Siemens
Subscribe
Simatic Net Cp 443-1 Opc Ua
Subscribe
Simatic Net Cp 443-1 Opc Ua Firmware
Subscribe
Tim 4r-ie
Subscribe
Tim 4r-ie Dnp3
Subscribe
Tim 4r-ie Dnp3 Firmware
Subscribe
Tim 4r-ie Firmware
Subscribe
Suse
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise Server
Subscribe
Manager
Subscribe
Manager Proxy
Subscribe
Openstack Cloud
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T00:46:39.878Z
Reserved: 2016-05-23T00:00:00.000Z
Link: CVE-2016-4954
No data.
Status : Modified
Published: 2016-07-05T01:59:01.267
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-4954
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN