Wind River Support Network

Meet the Support Network

Home CVE Database CVE-2014-9751

CVE-2014-9751

Description

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine\'s network interface with a packet from the ::1 address.

Priority: Medium
CVSS v3: 0.0
Component: ntp
Publish Date: Oct 5, 2015
Related ID: --
CVSS v2: 6.8
Modified Date: Oct 6, 2015

Find out more about CVE-2014-9751 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Won't Fix -- -- --
Wind River Linux 8 Requires LTSS -- -- --
Wind River Linux 9 Requires LTSS -- -- --
Wind River Linux 7 Fixed -- 7.0.0.10 --
Wind River Linux LTS 21 Won't Fix -- -- --
Wind River Linux LTS 22 Won't Fix -- -- --
Wind River Linux LTS 18 Won't Fix -- -- --
Wind River Linux LTS 19 Won't Fix -- -- --
Wind River Linux CD release Won't Fix -- -- --
Wind River Linux 6 Fixed -- 6.0.0.17 --
Wind River Linux LTS 23 Won't Fix -- -- --
VxWorks
VxWorks 7 Fixed V7NET-498
ntp-1.1.0.0 --
VxWorks 6.9 Fixed VXW6-84159
6.9.4.5 VxWorks 6.9.4.3 Point Patch for Defect VXW6-84159
Helix Virtualization Platform Cert Edition
Helix Virtualization Platform Cert Edition Not Vulnerable -- -- --

Related Products

Product Name Status Defect Fixed Downloads

Notes
Requires LTSS - customers must have active LTSS (Long Term Security Shield) Support to receive up-to-date information about vulnerabilities that may affect legacy software. Please contact your Wind River account team or see https://docs.windriver.com/bundle/Support_and_Maintenance_Supplemental_Terms_and_Conditions and https://support2.windriver.com/index.php?page=plc for more information.
Live chat
Online