Description
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1033951
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2015/dsa-3388
Patch, Vendor Advisory x_refsource_confirm
http://support.ntp.org/bin/view/Main/NtpBug2917
Issue Tracking, Third Party Advisory, VDB Entry x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1274258
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/77279
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201607-15
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20171004-0001/
Scores
CVSS v3
6.5
EPSS
0.0264
EPSS Percentile
85.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (10)
debian/debian_linux
7.0
debian/debian_linux
8.0
debian/debian_linux
9.0
netapp/clustered_data_ontap
netapp/data_ontap
netapp/oncommand_balance
netapp/oncommand_performance_manager
netapp/oncommand_unified_manager
ntp/ntp
4.2.8 (17 CPE variants)
ntp/ntp
4.2.0 - 4.2.8
Published
Aug 07, 2017
Tracked Since
Feb 18, 2026