The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine\'s network interface with a packet from the ::1 address.
Find out more about CVE-2014-9751 from the MITRE-CVE dictionary and NIST NVD
Login may be required to access defects or downloads.
Product Name | Status | Defect | Fixed | Downloads |
---|---|---|---|---|
Linux | ||||
Wind River Linux LTS 17 | Won't Fix | -- | -- | -- |
Wind River Linux 8 | Requires LTSS | -- | -- | -- |
Wind River Linux 9 | Requires LTSS | -- | -- | -- |
Wind River Linux 7 | Fixed | -- | 7.0.0.10 | -- |
Wind River Linux LTS 21 | Won't Fix | -- | -- | -- |
Wind River Linux LTS 22 | Won't Fix | -- | -- | -- |
Wind River Linux LTS 18 | Won't Fix | -- | -- | -- |
Wind River Linux LTS 19 | Won't Fix | -- | -- | -- |
Wind River Linux CD release | Won't Fix | -- | -- | -- |
Wind River Linux 6 | Fixed | -- | 6.0.0.17 | -- |
VxWorks | ||||
VxWorks 7 | Fixed |
V7NET-498 |
ntp-1.1.0.0 | -- |
VxWorks 6.9 | Fixed |
VXW6-84159 |
6.9.4.5 |
VxWorks 6.9.4.3 Point Patch for Defect VXW6-84159 |
Helix Virtualization Platform Cert Edition | ||||
Helix Virtualization Platform Cert Edition | Not Vulnerable | -- | -- | -- |
Product Name | Status | Defect | Fixed | Downloads |
---|