2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2016-4954" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2016-07-05T01:59:01.267" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T02:32:51.250" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication."
} ,
{
"lang" : "es" ,
"value" : "La funci\u00f3n process_packet en ntp_proto.c en ntpd en NTP 4.x en versiones anteriores a 4.2.8p8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (modificaci\u00f3n de par variable) enviando paquetes falsificados desde muchas direcciones IP de origen en un determinado escenario, seg\u00fan lo demostrado desencadenando una indicaci\u00f3n de salto incorrecta."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.0
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-362"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.2.0" ,
"versionEndExcluding" : "4.2.8" ,
"matchCriteriaId" : "C240BAAB-8C12-4501-9DC6-FB877304E908"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.3.0" ,
"versionEndExcluding" : "4.3.93" ,
"matchCriteriaId" : "863751A2-A97F-47CD-8D57-6D60E6F3593D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "EEA51D83-5841-4335-AF07-7A43C118CAAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "49ADE0C3-F75C-4EC0-8805-56013F0EB92C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8FF625A-EFA3-43D1-8698-4A37AE31A07C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3B99BBD-97FE-4615-905A-A614592226F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7A9AD3A-F030-4331-B52A-518BD963AB8A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*" ,
"matchCriteriaId" : "C293B8BE-6691-4944-BCD6-25EB98CABC73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "CEA650F8-2576-494A-A861-61572CA319D0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ED21EE8-7CBF-4BC5-BFC3-185D41296238"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "C76A0B44-13DE-4173-8D05-DA54F6A71759"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "1450241C-2F6D-4122-B33C-D78D065BA403"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "721AFD22-91D3-488E-A5E6-DD84C86E412B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "41E44E9F-6383-4E12-AEDC-B653FEA77A48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "466D9A37-2658-4695-9429-0C6BF4A631C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "99774181-5F12-446C-AC2C-DB1C52295EED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "99C71C00-7222-483B-AEFB-159337BD3C92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "75A9AA28-1B20-44BB-815C-7294A53E910E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C213794-111D-41F3-916C-AD97F731D600"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*" ,
"matchCriteriaId" : "50811A7B-0379-4437-8737-B4C1ACBC9EFD"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "964B57CD-CB8A-4520-B358-1C93EC5EF2DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79A602C5-61FE-47BA-9786-F045B6C6DBA8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD4EEF7C-CC33-4494-8531-7C0CC28A8823"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3CBED083-B935-4C47-BBDA-F39D8EA277ED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD6136E8-74DE-48AF-A8AB-B0E93D34870C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4863BE36-D16A-4D75-90D9-FD76DB5B48B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A0BA503-3F96-48DA-AF47-FBA37A9D0C48"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" ,
"matchCriteriaId" : "CB6476C7-03F2-4939-AB85-69AA524516D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*" ,
"matchCriteriaId" : "B12243B2-D726-404C-ABFF-F1AB51BA1783"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" ,
"matchCriteriaId" : "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" ,
"matchCriteriaId" : "2076747F-A98E-4DD9-9B52-BF1732BCAD3D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F488810-73E3-4475-975A-C2FCA037E78B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:tim_4r-ie_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0730ED6-676B-4200-BC07-C0B4531B242C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:tim_4r-ie:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B87B16C-9E9F-448B-9255-B2BB2B8CAD63"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E16E82E3-9A85-41A4-8A33-12AE45A1B584"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:siemens:tim_4r-ie_dnp3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE27728D-D37B-43FC-BA8A-0E930DDBD10B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://bugs.ntp.org/3044" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Issue Tracking" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://support.ntp.org/bin/view/Main/NtpBug3044" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://support.ntp.org/bin/view/Main/SecurityNotice" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160603-ntpd" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/321640" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/538599/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/538600/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/540683/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/538599/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/538600/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/archive/1/540683/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securitytracker.com/id/1036037" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.ubuntu.com/usn/USN-3096-1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3EYJQHJZ2KTVQ7ICEFHXTLZ36MRASWX/" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORAMN3Q7TVJ54MBYF75XCJOE3DP7LYHT/" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNWGCQLW2VY72NIUYMJOCAKJKTXHDUK2/" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://security.gentoo.org/glsa/201607-15" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://www.kb.cert.org/vuls/id/321640" ,
"source" : "cve@mitre.org"
}
]
}