{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2016-4955", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://bugs.ntp.org/3043", "refsource" : "CONFIRM", "url" : "http://bugs.ntp.org/3043" }, { "name" : "http://support.ntp.org/bin/view/Main/NtpBug3043", "refsource" : "CONFIRM", "url" : "http://support.ntp.org/bin/view/Main/NtpBug3043" }, { "name" : "http://support.ntp.org/bin/view/Main/SecurityNotice", "refsource" : "CONFIRM", "url" : "http://support.ntp.org/bin/view/Main/SecurityNotice" }, { "name" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource" : "CONFIRM", "url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name" : "FreeBSD-SA-16:24", "refsource" : "FREEBSD", "url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc" }, { "name" : "GLSA-201607-15", "refsource" : "GENTOO", "url" : "https://security.gentoo.org/glsa/201607-15" }, { "name" : "SUSE-SU-2016:1563", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" }, { "name" : "SUSE-SU-2016:1584", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" }, { "name" : "SUSE-SU-2016:1602", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" }, { "name" : "openSUSE-SU-2016:1583", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" }, { "name" : "openSUSE-SU-2016:1636", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" }, { "name" : "VU#321640", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/321640" }, { "name" : "91007", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/91007" }, { "name" : "1036037", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id/1036037" } ] } }