cve/2016/CVE-2016-9042.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-9042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042)
![](https://img.shields.io/static/v1?label=Product&message=Network%20Time%20Protocol&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=denial%20of%20service&color=brighgreen)
### Description
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
### POC
#### Reference
- http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html
- http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- http://www.ubuntu.com/usn/USN-3349-1
#### Github
No PoCs found on GitHub currently.