CVE-2016-7426

Published on: 01/13/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Ubuntu Linux from Canonical contain the following vulnerability:

NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.

  • CVE-2016-7426 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Third Party Advisory
security.FreeBSD.org
text/plain
URL Logo FREEBSD FreeBSD-SA-16:39
No Description Provided Release Notes
Vendor Advisory
support.ntp.org
text/html
URL Logo CONFIRM support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
ntp Multiple Bugs Let Remote Users Cause the Target Service to Crash - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1037354
NTP CVE-2016-7426 Local Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 94451
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2017:0252
USN-3707-2: NTP vulnerabilities | Ubuntu security notices Third Party Advisory
usn.ubuntu.com
text/html
URL Logo UBUNTU USN-3707-2
Document Display | HPE Support Center Third Party Advisory
h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
Broadcom Support Portal Third Party Advisory
bto.bluecoat.com
text/html
URL Logo CONFIRM bto.bluecoat.com/security-advisory/sa139
Network Time Foundation Publishes NTP 4.2.8p9 Security Release Third Party Advisory
nwtime.org
text/html
URL Logo CONFIRM nwtime.org/ntp428p9_release/
Vulnerability Note VU#633847 - NTP.org ntpd contains multiple denial of service vulnerabilities Third Party Advisory
US Government Resource
www.kb.cert.org
text/html
URL Logo CERT-VN VU#633847
No Description Provided Issue Tracking
Mitigation
Vendor Advisory
support.ntp.org
text/html
URL Logo CONFIRM support.ntp.org/bin/view/Main/NtpBug3071

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
ApplicationHpeHpux-ntpAllAllAllAll
ApplicationHpeHpux-ntpAllAllAllAll
ApplicationNtpNtpAllAllAllAll
ApplicationNtpNtp4.2.5p203AllAll
ApplicationNtpNtp4.2.5p204AllAll
ApplicationNtpNtp4.2.5p205AllAll
ApplicationNtpNtp4.2.5p206AllAll
ApplicationNtpNtp4.2.5p207AllAll
ApplicationNtpNtp4.2.5p208AllAll
ApplicationNtpNtp4.2.5p209AllAll
ApplicationNtpNtp4.2.5p210AllAll
ApplicationNtpNtp4.2.5p211AllAll
ApplicationNtpNtp4.2.5p212AllAll
ApplicationNtpNtp4.2.5p213AllAll
ApplicationNtpNtp4.2.5p214AllAll
ApplicationNtpNtp4.2.5p215AllAll
ApplicationNtpNtp4.2.5p216AllAll
ApplicationNtpNtp4.2.5p217AllAll
ApplicationNtpNtp4.2.5p218AllAll
ApplicationNtpNtp4.2.5p219AllAll
ApplicationNtpNtp4.2.5p220AllAll
ApplicationNtpNtp4.2.5p221AllAll
ApplicationNtpNtp4.2.5p222AllAll
ApplicationNtpNtp4.2.5p223AllAll
ApplicationNtpNtp4.2.5p224AllAll
ApplicationNtpNtp4.2.5p225AllAll
ApplicationNtpNtp4.2.5p226AllAll
ApplicationNtpNtp4.2.5p227AllAll
ApplicationNtpNtp4.2.5p228AllAll
ApplicationNtpNtp4.2.5p229AllAll
ApplicationNtpNtp4.2.5p230AllAll
ApplicationNtpNtp4.2.5p231_rc1AllAll
ApplicationNtpNtp4.2.5p232_rc1AllAll
ApplicationNtpNtp4.2.5p233_rc1AllAll
ApplicationNtpNtp4.2.5p234_rc1AllAll
ApplicationNtpNtp4.2.5p235_rc1AllAll
ApplicationNtpNtp4.2.5p236_rc1AllAll
ApplicationNtpNtp4.2.5p237_rc1AllAll
ApplicationNtpNtp4.2.5p238_rc1AllAll
ApplicationNtpNtp4.2.5p239_rc1AllAll
ApplicationNtpNtp4.2.5p240_rc1AllAll
ApplicationNtpNtp4.2.5p241_rc1AllAll
ApplicationNtpNtp4.2.5p242_rc1AllAll
ApplicationNtpNtp4.2.5p243_rc1AllAll
ApplicationNtpNtp4.2.5p244_rc1AllAll
ApplicationNtpNtp4.2.5p245_rc1AllAll
ApplicationNtpNtp4.2.5p246_rc1AllAll
ApplicationNtpNtp4.2.5p247_rc1AllAll
ApplicationNtpNtp4.2.5p248_rc1AllAll
ApplicationNtpNtp4.2.5p249_rc1AllAll
ApplicationNtpNtp4.2.5p250_rc1AllAll
ApplicationNtpNtp4.2.8-AllAll
ApplicationNtpNtp4.2.8p1AllAll
ApplicationNtpNtp4.2.8p1-beta1AllAll
ApplicationNtpNtp4.2.8p1-beta2AllAll
ApplicationNtpNtp4.2.8p1-beta3AllAll
ApplicationNtpNtp4.2.8p1-beta4AllAll
ApplicationNtpNtp4.2.8p1-beta5AllAll
ApplicationNtpNtp4.2.8p1-rc1AllAll
ApplicationNtpNtp4.2.8p1-rc2AllAll
ApplicationNtpNtp4.2.8p2AllAll
ApplicationNtpNtp4.2.8p2-rc1AllAll
ApplicationNtpNtp4.2.8p2-rc2AllAll
ApplicationNtpNtp4.2.8p2-rc3AllAll
ApplicationNtpNtp4.2.8p3AllAll
ApplicationNtpNtp4.2.8p3-rc1AllAll
ApplicationNtpNtp4.2.8p3-rc2AllAll
ApplicationNtpNtp4.2.8p3-rc3AllAll
ApplicationNtpNtp4.2.8p4AllAll
ApplicationNtpNtp4.2.8p5AllAll
ApplicationNtpNtp4.2.8p6AllAll
ApplicationNtpNtp4.2.8p7AllAll
ApplicationNtpNtp4.2.8p8AllAll
ApplicationNtpNtpAllAllAllAll
ApplicationNtpNtp4.2.5p203AllAll
ApplicationNtpNtp4.2.5p204AllAll
ApplicationNtpNtp4.2.5p205AllAll
ApplicationNtpNtp4.2.5p206AllAll
ApplicationNtpNtp4.2.5p207AllAll
ApplicationNtpNtp4.2.5p208AllAll
ApplicationNtpNtp4.2.5p209AllAll
ApplicationNtpNtp4.2.5p210AllAll
ApplicationNtpNtp4.2.5p211AllAll
ApplicationNtpNtp4.2.5p212AllAll
ApplicationNtpNtp4.2.5p213AllAll
ApplicationNtpNtp4.2.5p214AllAll
ApplicationNtpNtp4.2.5p215AllAll
ApplicationNtpNtp4.2.5p216AllAll
ApplicationNtpNtp4.2.5p217AllAll
ApplicationNtpNtp4.2.5p218AllAll
ApplicationNtpNtp4.2.5p219AllAll
ApplicationNtpNtp4.2.5p220AllAll
ApplicationNtpNtp4.2.5p221AllAll
ApplicationNtpNtp4.2.5p222AllAll
ApplicationNtpNtp4.2.5p223AllAll
ApplicationNtpNtp4.2.5p224AllAll
ApplicationNtpNtp4.2.5p225AllAll
ApplicationNtpNtp4.2.5p226AllAll
ApplicationNtpNtp4.2.5p227AllAll
ApplicationNtpNtp4.2.5p228AllAll
ApplicationNtpNtp4.2.5p229AllAll
ApplicationNtpNtp4.2.5p230AllAll
ApplicationNtpNtp4.2.5p231_rc1AllAll
ApplicationNtpNtp4.2.5p232_rc1AllAll
ApplicationNtpNtp4.2.5p233_rc1AllAll
ApplicationNtpNtp4.2.5p234_rc1AllAll
ApplicationNtpNtp4.2.5p235_rc1AllAll
ApplicationNtpNtp4.2.5p236_rc1AllAll
ApplicationNtpNtp4.2.5p237_rc1AllAll
ApplicationNtpNtp4.2.5p238_rc1AllAll
ApplicationNtpNtp4.2.5p239_rc1AllAll
ApplicationNtpNtp4.2.5p240_rc1AllAll
ApplicationNtpNtp4.2.5p241_rc1AllAll
ApplicationNtpNtp4.2.5p242_rc1AllAll
ApplicationNtpNtp4.2.5p243_rc1AllAll
ApplicationNtpNtp4.2.5p244_rc1AllAll
ApplicationNtpNtp4.2.5p245_rc1AllAll
ApplicationNtpNtp4.2.5p246_rc1AllAll
ApplicationNtpNtp4.2.5p247_rc1AllAll
ApplicationNtpNtp4.2.5p248_rc1AllAll
ApplicationNtpNtp4.2.5p249_rc1AllAll
ApplicationNtpNtp4.2.5p250_rc1AllAll
ApplicationNtpNtp4.2.8-AllAll
ApplicationNtpNtp4.2.8p1AllAll
ApplicationNtpNtp4.2.8p1-beta1AllAll
ApplicationNtpNtp4.2.8p1-beta2AllAll
ApplicationNtpNtp4.2.8p1-beta3AllAll
ApplicationNtpNtp4.2.8p1-beta4AllAll
ApplicationNtpNtp4.2.8p1-beta5AllAll
ApplicationNtpNtp4.2.8p1-rc1AllAll
ApplicationNtpNtp4.2.8p1-rc2AllAll
ApplicationNtpNtp4.2.8p2AllAll
ApplicationNtpNtp4.2.8p2-rc1AllAll
ApplicationNtpNtp4.2.8p2-rc2AllAll
ApplicationNtpNtp4.2.8p2-rc3AllAll
ApplicationNtpNtp4.2.8p3AllAll
ApplicationNtpNtp4.2.8p3-rc1AllAll
ApplicationNtpNtp4.2.8p3-rc2AllAll
ApplicationNtpNtp4.2.8p3-rc3AllAll
ApplicationNtpNtp4.2.8p4AllAll
ApplicationNtpNtp4.2.8p5AllAll
ApplicationNtpNtp4.2.8p6AllAll
ApplicationNtpNtp4.2.8p7AllAll
ApplicationNtpNtp4.2.8p8AllAll
Operating
System
RedhatEnterprise Linux Desktop6.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop7.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop6.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop7.0AllAllAll
Operating
System
RedhatEnterprise Linux Server6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server7.0AllAllAll
Operating
System
RedhatEnterprise Linux Server6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server7.0AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.4AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.4AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.4AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.5AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.4AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.5AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.3AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.6AllAllAll
Operating
System
RedhatEnterprise Linux Server Tus7.7AllAllAll
Operating
System
RedhatEnterprise Linux Workstation6.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation7.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation6.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation7.0AllAllAll
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*:
  • cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*:
  • cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*: