CVE-2016-7426
Published on: 01/13/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:06 PM UTC
Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
- CVE-2016-7426 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
NETWORK | LOW | NONE | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 4.3 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Third Party Advisory security.FreeBSD.org text/plain |
![]() | |
No Description Provided | Release Notes Vendor Advisory support.ntp.org text/html |
![]() |
ntp Multiple Bugs Let Remote Users Cause the Target Service to Crash - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
NTP CVE-2016-7426 Local Denial of Service Vulnerability | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
Red Hat Customer Portal | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
USN-3707-2: NTP vulnerabilities | Ubuntu security notices | Third Party Advisory usn.ubuntu.com text/html |
![]() |
Document Display | HPE Support Center | Third Party Advisory h20566.www2.hpe.com text/html |
![]() |
Broadcom Support Portal | Third Party Advisory bto.bluecoat.com text/html |
![]() |
Network Time Foundation Publishes NTP 4.2.8p9 Security Release | Third Party Advisory nwtime.org text/html |
![]() |
Vulnerability Note VU#633847 - NTP.org ntpd contains multiple denial of service vulnerabilities | Third Party Advisory US Government Resource www.kb.cert.org text/html |
![]() |
No Description Provided | Issue Tracking Mitigation Vendor Advisory support.ntp.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
Application | Hpe | Hpux-ntp | All | All | All | All |
Application | Hpe | Hpux-ntp | All | All | All | All |
Application | Ntp | Ntp | All | All | All | All |
Application | Ntp | Ntp | 4.2.5 | p203 | All | All |
Application | Ntp | Ntp | 4.2.5 | p204 | All | All |
Application | Ntp | Ntp | 4.2.5 | p205 | All | All |
Application | Ntp | Ntp | 4.2.5 | p206 | All | All |
Application | Ntp | Ntp | 4.2.5 | p207 | All | All |
Application | Ntp | Ntp | 4.2.5 | p208 | All | All |
Application | Ntp | Ntp | 4.2.5 | p209 | All | All |
Application | Ntp | Ntp | 4.2.5 | p210 | All | All |
Application | Ntp | Ntp | 4.2.5 | p211 | All | All |
Application | Ntp | Ntp | 4.2.5 | p212 | All | All |
Application | Ntp | Ntp | 4.2.5 | p213 | All | All |
Application | Ntp | Ntp | 4.2.5 | p214 | All | All |
Application | Ntp | Ntp | 4.2.5 | p215 | All | All |
Application | Ntp | Ntp | 4.2.5 | p216 | All | All |
Application | Ntp | Ntp | 4.2.5 | p217 | All | All |
Application | Ntp | Ntp | 4.2.5 | p218 | All | All |
Application | Ntp | Ntp | 4.2.5 | p219 | All | All |
Application | Ntp | Ntp | 4.2.5 | p220 | All | All |
Application | Ntp | Ntp | 4.2.5 | p221 | All | All |
Application | Ntp | Ntp | 4.2.5 | p222 | All | All |
Application | Ntp | Ntp | 4.2.5 | p223 | All | All |
Application | Ntp | Ntp | 4.2.5 | p224 | All | All |
Application | Ntp | Ntp | 4.2.5 | p225 | All | All |
Application | Ntp | Ntp | 4.2.5 | p226 | All | All |
Application | Ntp | Ntp | 4.2.5 | p227 | All | All |
Application | Ntp | Ntp | 4.2.5 | p228 | All | All |
Application | Ntp | Ntp | 4.2.5 | p229 | All | All |
Application | Ntp | Ntp | 4.2.5 | p230 | All | All |
Application | Ntp | Ntp | 4.2.5 | p231_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p232_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p233_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p234_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p235_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p236_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p237_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p238_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p239_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p240_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p241_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p242_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p243_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p244_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p245_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p246_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p247_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p248_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p249_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p250_rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | - | All | All |
Application | Ntp | Ntp | 4.2.8 | p1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta4 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta5 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p4 | All | All |
Application | Ntp | Ntp | 4.2.8 | p5 | All | All |
Application | Ntp | Ntp | 4.2.8 | p6 | All | All |
Application | Ntp | Ntp | 4.2.8 | p7 | All | All |
Application | Ntp | Ntp | 4.2.8 | p8 | All | All |
Application | Ntp | Ntp | All | All | All | All |
Application | Ntp | Ntp | 4.2.5 | p203 | All | All |
Application | Ntp | Ntp | 4.2.5 | p204 | All | All |
Application | Ntp | Ntp | 4.2.5 | p205 | All | All |
Application | Ntp | Ntp | 4.2.5 | p206 | All | All |
Application | Ntp | Ntp | 4.2.5 | p207 | All | All |
Application | Ntp | Ntp | 4.2.5 | p208 | All | All |
Application | Ntp | Ntp | 4.2.5 | p209 | All | All |
Application | Ntp | Ntp | 4.2.5 | p210 | All | All |
Application | Ntp | Ntp | 4.2.5 | p211 | All | All |
Application | Ntp | Ntp | 4.2.5 | p212 | All | All |
Application | Ntp | Ntp | 4.2.5 | p213 | All | All |
Application | Ntp | Ntp | 4.2.5 | p214 | All | All |
Application | Ntp | Ntp | 4.2.5 | p215 | All | All |
Application | Ntp | Ntp | 4.2.5 | p216 | All | All |
Application | Ntp | Ntp | 4.2.5 | p217 | All | All |
Application | Ntp | Ntp | 4.2.5 | p218 | All | All |
Application | Ntp | Ntp | 4.2.5 | p219 | All | All |
Application | Ntp | Ntp | 4.2.5 | p220 | All | All |
Application | Ntp | Ntp | 4.2.5 | p221 | All | All |
Application | Ntp | Ntp | 4.2.5 | p222 | All | All |
Application | Ntp | Ntp | 4.2.5 | p223 | All | All |
Application | Ntp | Ntp | 4.2.5 | p224 | All | All |
Application | Ntp | Ntp | 4.2.5 | p225 | All | All |
Application | Ntp | Ntp | 4.2.5 | p226 | All | All |
Application | Ntp | Ntp | 4.2.5 | p227 | All | All |
Application | Ntp | Ntp | 4.2.5 | p228 | All | All |
Application | Ntp | Ntp | 4.2.5 | p229 | All | All |
Application | Ntp | Ntp | 4.2.5 | p230 | All | All |
Application | Ntp | Ntp | 4.2.5 | p231_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p232_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p233_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p234_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p235_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p236_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p237_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p238_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p239_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p240_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p241_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p242_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p243_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p244_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p245_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p246_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p247_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p248_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p249_rc1 | All | All |
Application | Ntp | Ntp | 4.2.5 | p250_rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | - | All | All |
Application | Ntp | Ntp | 4.2.8 | p1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta4 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-beta5 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p1-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p2-rc3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc1 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc2 | All | All |
Application | Ntp | Ntp | 4.2.8 | p3-rc3 | All | All |
Application | Ntp | Ntp | 4.2.8 | p4 | All | All |
Application | Ntp | Ntp | 4.2.8 | p5 | All | All |
Application | Ntp | Ntp | 4.2.8 | p6 | All | All |
Application | Ntp | Ntp | 4.2.8 | p7 | All | All |
Application | Ntp | Ntp | 4.2.8 | p8 | All | All |
Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Aus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Eus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.3 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.6 | All | All | All |
Operating System | Redhat | Enterprise Linux Server Tus | 7.7 | All | All | All |
Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
- cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
- cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE