An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| Hyperlink | Source | Resource |
|---|---|---|
| http://www.securityfocus.com/bid/77275 | cve@mitre.org | Broken Link |
| http://www.securitytracker.com/id/1033951 | cve@mitre.org | Broken Link |
| http://www.talosintelligence.com/reports/TALOS-2015-0052/ | cve@mitre.org | Exploit Technical Description Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201607-15 | cve@mitre.org | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20171004-0001/ | cve@mitre.org | Third Party Advisory |
| http://www.securityfocus.com/bid/77275 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://www.securitytracker.com/id/1033951 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link |
| http://www.talosintelligence.com/reports/TALOS-2015-0052/ | af854a3a-2127-422b-91ae-364da2661108 | Exploit Technical Description Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201607-15 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20171004-0001/ | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |