2017-10-16 12:31:07 -04:00
{
2019-03-17 23:36:24 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2015-5300" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 23:36:24 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart)."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "RHSA-2015:1930" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2015-1930.html"
} ,
{
"name" : "SUSE-SU:2016:1912" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"
} ,
{
"name" : "[slackware-security] 20160223 ntp (SSA:2016-054-04)" ,
"refsource" : "MLIST" ,
"url" : "http://seclists.org/bugtraq/2016/Feb/164"
} ,
{
"name" : "openSUSE-SU:2016:1423" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"
} ,
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" ,
"refsource" : "CONFIRM" ,
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
} ,
{
"name" : "USN-2783-1" ,
"refsource" : "UBUNTU" ,
"url" : "http://www.ubuntu.com/usn/USN-2783-1"
} ,
{
"name" : "SUSE-SU:2016:1177" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"
} ,
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01" ,
"refsource" : "MISC" ,
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01"
} ,
{
"name" : "https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
} ,
{
"name" : "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit"
} ,
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1271076" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1271076"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=swg21980676" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=swg21980676"
} ,
{
"name" : "https://support.citrix.com/article/CTX220112" ,
"refsource" : "CONFIRM" ,
"url" : "https://support.citrix.com/article/CTX220112"
} ,
{
"name" : "FEDORA-2015-77bfbc1bcd" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html"
} ,
{
"name" : "https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428"
} ,
{
"name" : "FEDORA-2015-f5f5ec7b6b" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170684.html"
} ,
{
"name" : "DSA-3388" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2015/dsa-3388"
} ,
{
"name" : "https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
} ,
{
"name" : "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc" ,
"refsource" : "CONFIRM" ,
"url" : "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc"
} ,
{
"name" : "https://www.cs.bu.edu/~goldbe/NTPattack.html" ,
"refsource" : "MISC" ,
"url" : "https://www.cs.bu.edu/~goldbe/NTPattack.html"
} ,
{
"name" : "SUSE-SU:2016:2094" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"
} ,
{
"name" : "FEDORA-2016-34bc10a2c8" ,
"refsource" : "FEDORA" ,
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html"
} ,
{
"name" : "1034670" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1034670"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073"
} ,
{
"name" : "77312" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/77312"
} ,
{
"name" : "SUSE-SU:2016:1311" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"
} ,
{
"name" : "FreeBSD-SA-16:02" ,
"refsource" : "FREEBSD" ,
"url" : "https://www.freebsd.org/security/advisories/FreeBSD-SA-16:02.ntp.asc"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=swg21979393" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=swg21979393"
} ,
{
"name" : "openSUSE-SU:2016:1292" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264"
} ,
{
"name" : "SUSE-SU:2016:1247" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885"
} ,
{
"name" : "https://bto.bluecoat.com/security-advisory/sa113" ,
"refsource" : "CONFIRM" ,
"url" : "https://bto.bluecoat.com/security-advisory/sa113"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=swg21983501" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=swg21983501"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821"
} ,
{
"name" : "http://support.ntp.org/bin/view/Main/NtpBug2956" ,
"refsource" : "CONFIRM" ,
"url" : "http://support.ntp.org/bin/view/Main/NtpBug2956"
} ,
{
"name" : "https://www-01.ibm.com/support/docview.wss?uid=swg21983506" ,
"refsource" : "CONFIRM" ,
"url" : "https://www-01.ibm.com/support/docview.wss?uid=swg21983506"
} ,
{
"name" : "SUSE-SU:2016:1175" ,
"refsource" : "SUSE" ,
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"
} ,
{
"name" : "https://security.netapp.com/advisory/ntap-20171004-0001/" ,
"refsource" : "CONFIRM" ,
"url" : "https://security.netapp.com/advisory/ntap-20171004-0001/"
}
]
}
}