An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
References
Link | Resource |
---|---|
http://www.talosintelligence.com/reports/TALOS-2015-0052/ | Exploit Technical Description Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/77275 | |
https://security.gentoo.org/glsa/201607-15 | |
http://www.securitytracker.com/id/1033951 | |
https://security.netapp.com/advisory/ntap-20171004-0001/ |
Configurations
Information
Published : 2017-01-06 13:59
Updated : 2017-11-09 18:29
NVD link : CVE-2015-7848
Mitre link : CVE-2015-7848
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
ntp
- ntp-dev