CVE-2016-4956

Published on: 07/04/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:59 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Certain versions of Suse Manager from Novell contain the following vulnerability:

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.

  • CVE-2016-4956 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE LOW

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Oracle Solaris Bulletin - April 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
[security-announce] openSUSE-SU-2016:1636-1: important: Security update Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1636
[security-announce] openSUSE-SU-2016:1583-1: important: Security update Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1583
NTP: Multiple vulnerabilities (GLSA 201607-15) — Gentoo Security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201607-15
[security-announce] SUSE-SU-2016:1602-1: important: Security update for Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1602
ntp Multiple Bugs Let Remote Users Modify Parameters and Deny Service - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036037
No Description Provided Release Notes
Vendor Advisory
support.ntp.org
text/html
URL Logo CONFIRM support.ntp.org/bin/view/Main/SecurityNotice
Vulnerability Note VU#321640 - NTP.org ntpd is vulnerable to denial of service and other vulnerabilities Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#321640
[security-announce] SUSE-SU-2016:1563-1: important: Security update for Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1563
No Description Provided Vendor Advisory
support.ntp.org
text/html
URL Logo CONFIRM support.ntp.org/bin/view/Main/NtpBug3042
Bug 3042 – Broadcast interleave Issue Tracking
Vendor Advisory
bugs.ntp.org
text/html
URL Logo CONFIRM bugs.ntp.org/3042
[security-announce] SUSE-SU-2016:1584-1: important: Security update for Mailing List
Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1584
Third Party Advisory
security.FreeBSD.org
text/plain
FREEBSD FreeBSD-SA-16:24
NTP CVE-2016-4956 Incomplete Fix Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 91009

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
NovellSuse Manager2.1AllAllAll
Operating
System
NovellSuse Manager2.1AllAllAll
ApplicationNtpNtpAllAllAllAll
ApplicationNtpNtp4.2.8-AllAll
ApplicationNtpNtp4.2.8p1AllAll
ApplicationNtpNtp4.2.8p1-beta1AllAll
ApplicationNtpNtp4.2.8p1-beta2AllAll
ApplicationNtpNtp4.2.8p1-beta3AllAll
ApplicationNtpNtp4.2.8p1-beta4AllAll
ApplicationNtpNtp4.2.8p1-beta5AllAll
ApplicationNtpNtp4.2.8p1-rc1AllAll
ApplicationNtpNtp4.2.8p1-rc2AllAll
ApplicationNtpNtp4.2.8p2AllAll
ApplicationNtpNtp4.2.8p2-rc1AllAll
ApplicationNtpNtp4.2.8p2-rc2AllAll
ApplicationNtpNtp4.2.8p2-rc3AllAll
ApplicationNtpNtp4.2.8p3AllAll
ApplicationNtpNtp4.2.8p3-rc1AllAll
ApplicationNtpNtp4.2.8p3-rc2AllAll
ApplicationNtpNtp4.2.8p3-rc3AllAll
ApplicationNtpNtp4.2.8p4AllAll
ApplicationNtpNtp4.2.8p5AllAll
ApplicationNtpNtp4.2.8p6AllAll
ApplicationNtpNtp4.2.8p7AllAll
ApplicationNtpNtpAllAllAllAll
ApplicationNtpNtp4.2.8-AllAll
ApplicationNtpNtp4.2.8p1AllAll
ApplicationNtpNtp4.2.8p1-beta1AllAll
ApplicationNtpNtp4.2.8p1-beta2AllAll
ApplicationNtpNtp4.2.8p1-beta3AllAll
ApplicationNtpNtp4.2.8p1-beta4AllAll
ApplicationNtpNtp4.2.8p1-beta5AllAll
ApplicationNtpNtp4.2.8p1-rc1AllAll
ApplicationNtpNtp4.2.8p1-rc2AllAll
ApplicationNtpNtp4.2.8p2AllAll
ApplicationNtpNtp4.2.8p2-rc1AllAll
ApplicationNtpNtp4.2.8p2-rc2AllAll
ApplicationNtpNtp4.2.8p2-rc3AllAll
ApplicationNtpNtp4.2.8p3AllAll
ApplicationNtpNtp4.2.8p3-rc1AllAll
ApplicationNtpNtp4.2.8p3-rc2AllAll
ApplicationNtpNtp4.2.8p3-rc3AllAll
ApplicationNtpNtp4.2.8p4AllAll
ApplicationNtpNtp4.2.8p5AllAll
ApplicationNtpNtp4.2.8p6AllAll
ApplicationNtpNtp4.2.8p7AllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OracleSolaris10AllAllAll
Operating
System
OracleSolaris11.3AllAllAll
Operating
System
OracleSolaris10AllAllAll
Operating
System
OracleSolaris11.3AllAllAll
Operating
System
SuseLinux Enterprise Desktop12sp1AllAll
Operating
System
SuseLinux Enterprise Desktop12sp1AllAll
Operating
System
SuseLinux Enterprise Server11sp2AllAll
Operating
System
SuseLinux Enterprise Server11sp3AllAll
Operating
System
SuseLinux Enterprise Server11sp4AllAll
Operating
System
SuseLinux Enterprise Server12sp1AllAll
Operating
System
SuseLinux Enterprise Server11sp2AllAll
Operating
System
SuseLinux Enterprise Server11sp3AllAll
Operating
System
SuseLinux Enterprise Server11sp4AllAll
Operating
System
SuseLinux Enterprise Server12sp1AllAll
ApplicationSuseManager Proxy2.1AllAllAll
ApplicationSuseManager Proxy2.1AllAllAll
ApplicationSuseOpenstack Cloud5AllAllAll
ApplicationSuseOpenstack Cloud5AllAllAll
  • cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*:
  • cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*:
  • cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*: