CVE-2016-9042
Summary
| CVE | CVE-2016-9042 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-04 20:29:00 UTC |
| Updated | 2023-11-07 02:36:00 UTC |
| Description | An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Full Disclosure: APPLE-SA-2017-09-25-1 macOS High Sierra 10.13 |
FULLDISC |
seclists.org |
|
| Knowledge Center |
CONFIRM |
kc.mcafee.com |
|
| Siemens SIMATIC NET CP 443-1 OPC UA | CISA |
MISC |
us-cert.cisa.gov |
|
| FreeBSD Security Advisory - FreeBSD-SA-17:03.ntp ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| [SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Document Display | HPE Support Center |
CONFIRM |
support.hpe.com |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| NTP CVE-2016-9042 Denial of Service Vulnerability |
BID |
www.securityfocus.com |
Permissions Required, Third Party Advisory, VDB Entry |
| cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf |
CONFIRM |
cert-portal.siemens.com |
|
| FreeBSD-SA-17:03 |
FREEBSD |
security.FreeBSD.org |
Third Party Advisory |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| support.f5.com/csp/article/K39041624 |
CONFIRM |
support.f5.com |
|
| Slackware Security Advisory - ntp Updates ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| USN-3349-1: NTP vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| TALOS-2016-0260 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence |
MISC |
www.talosintelligence.com |
Exploit, Mitigation, Third Party Advisory |
| Broadcom Support Portal |
CONFIRM |
bto.bluecoat.com |
|
| Full Disclosure: APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13 |
FULLDISC |
seclists.org |
|
| ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| Apple macOS/OS X Multiple Flaws Let Remote and Local Users Bypass Security and Deny Service, Local Users Obtain Potentially Sensitive Information, and Applications Gain Elevated Privileges - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| About the security content of macOS High Sierra 10.13 - Apple Support |
CONFIRM |
support.apple.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 44030 Juniper Network Operating System (Junos OS) Multiple NTP Vulnerabilities (JSA11171)
- 590736 Siemens SIMATIC NET CP 443-1 OPC UA Multiple Vulnerabilities (ICSA-21-159-11)