Last update: April 22, 2024 18:49 UTC (7e7bd5857)
Resolved | 4.2.8p6 | 19 Jan 2016 |
---|---|---|
References | Bug 2939 | CVE-2015-7977 |
Affects | All ntp-4 releases up to, but not including 4.2.8p6, and 4.3.0 up to, but not including 4.3.90. |
Resolved in 4.2.8p6. |
CVSS2 Score | 4.3 | AV:N/AC:M/Au:N/C:N/I:N/A:P |
An unauthenticated ntpdc reslist
command can cause a segmentation fault in ntpd
by causing a NULL pointer dereference.
Implement BCP-38.
Upgrade to 4.2.8p6 or later.](https://downloads.nwtime.org/ntp/4.2.8/)
If you are unable to upgrade:
requestkey
to control who can issue mode 7 requests.restrict noquery
to further limit mode 7 requests to trusted sources.Monitor your ntpd
instances.
This weakness was discovered by Stephen Gray of Cisco ASIG.