CVE-2016-1550
Summary
| CVE | CVE-2016-1550 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-01-06 21:59:00 UTC |
| Updated | 2021-11-17 22:15:00 UTC |
| Description | An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2016:1329-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | SUSE | lists.opensuse.org | |
| Oracle Solaris Bulletin - April 2016 | CONFIRM | www.oracle.com | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| Siemens SIMATIC NET CP 443-1 OPC UA | CISA | MISC | us-cert.cisa.gov | |
| [security-announce] SUSE-SU-2016:1568-1: important: Security update for | SUSE | lists.opensuse.org | |
| Security Advisory 0019 - Arista | MISC | www.arista.com | |
| NTP: Multiple vulnerabilities (GLSA 201607-15) — Gentoo Security | GENTOO | security.gentoo.org | |
| cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | CONFIRM | cert-portal.siemens.com | |
| openSUSE-SU-2016:1423-1: moderate: Security update for ntp | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 24 Update: ntp-4.2.6p5-40.fc24 | FEDORA | lists.fedoraproject.org | |
| Slackware Security Advisory - ntp Updates ≈ Packet Storm | MISC | packetstormsecurity.com | |
| April 2016 Network Time Protocol Daemon (ntpd) Vulnerabilities in Multiple NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| Siemens TIM 4R-IE Devices | CISA | MISC | us-cert.cisa.gov | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| ntp Multiple Bugs Let Remote Users Spoof Messages, Obtain Potentially Sensitive Information, Modify Time, and Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | |
| [security-announce] SUSE-SU-2016:1471-1: important: Security update for | SUSE | lists.opensuse.org | |
| Oracle Linux Bulletin - April 2016 | CONFIRM | www.oracle.com | |
| Vulnerability Note VU#718152 - NTP.org ntpd contains multiple vulnerabilities | CERT-VN | www.kb.cert.org | |
| Cisco Talos - Talos 2016 0084 | MISC | www.talosintelligence.com | Technical Description, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | |
| [security-announce] SUSE-SU-2016:1278-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3629-1 ntp | DEBIAN | www.debian.org | |
| [security-announce] SUSE-SU-2016:1912-1: important: Security update for | SUSE | lists.opensuse.org | |
| Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016 | CISCO | tools.cisco.com | |
| [security-announce] SUSE-SU-2016:1291-1: important: Security update for ntp - openSUSE Security Announce - openSUSE Mailing Lists | SUSE | lists.opensuse.org | |
| [security-announce] SUSE-SU-2016:2094-1: important: Security update for | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 23 Update: ntp-4.2.6p5-40.fc23 | FEDORA | lists.fedoraproject.org | |
| NTP CVE-2016-1550 Local Security Bypass Vulnerability | BID | www.securityfocus.com | |
| FreeBSD-SA-16:16 | FREEBSD | security.FreeBSD.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| TALOS-2016-0084 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence | MISC | www.talosintelligence.com | |
| cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf | CONFIRM | cert-portal.siemens.com | |
| USN-3096-1: NTP vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | |
| Debian -- Security Information -- DSA-3629-1 ntp | DEBIAN | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.