The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-08-07 13:29
Updated : 2021-07-16 06:15
NVD link : CVE-2015-7853
Mitre link : CVE-2015-7853
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
netapp
- clustered_data_ontap
- data_ontap
- oncommand_unified_manager
- oncommand_balance
- oncommand_performance_manager
ntp
- ntp