{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2016-7426", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "url" : "http://nwtime.org/ntp428p9_release/" }, { "url" : "http://support.ntp.org/bin/view/Main/NtpBug3071" }, { "url" : "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "url" : "https://bto.bluecoat.com/security-advisory/sa139" }, { "url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us" }, { "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc" }, { "url" : "http://rhn.redhat.com/errata/RHSA-2017-0252.html" }, { "url" : "https://www.kb.cert.org/vuls/id/633847" }, { "url" : "http://www.securityfocus.com/bid/94451" }, { "url" : "http://www.securitytracker.com/id/1037354" } ] } }