Home CVE Database CVE-2014-9751

CVE-2014-9751

Description

The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine\'s network interface with a packet from the ::1 address.

Priority: Medium
CVSS v3: 0.0
Publish Date: Oct 5, 2015
Related ID: --
CVSS v2: 6.8
Modified Date: Oct 6, 2015

Find out more about CVE-2014-9751 from the MITRE-CVE dictionary and NIST NVD


Products Affected

Login may be required to access defects or downloads.

Product Name Status Defect Fixed Downloads
Linux
Wind River Linux LTS 17 Won't Fix -- -- --
Wind River Linux 9 Won't Fix -- -- --
Wind River Linux 8 Won't Fix -- -- --
Wind River Linux LTS 18 Won't Fix -- -- --
Wind River Linux LTS 19 Won't Fix -- -- --
Wind River Linux CD release Won't Fix -- -- --
VxWorks
VxWorks 7 Fixed V7NET-498
ntp-1.1.0.0 --
VxWorks 6.9 Fixed VXW6-84159
6.9.4.5 VxWorks 6.9.4.3 Point Patch for Defect VXW6-84159

Related Products

Product Name Status Defect Fixed Downloads
Linux 7 SCP Not Vulnerable -- -- --
Linux 7 CGP Not Vulnerable -- -- --

Comments

ntp

Live chat
Online