{"api_version":"1","generated_at":"2026-04-23T04:09:39+00:00","cve":"CVE-2016-9042","urls":{"html":"https://cve.report/CVE-2016-9042","api":"https://cve.report/api/cve/CVE-2016-9042.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-9042","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-9042"},"summary":{"title":"CVE-2016-9042","description":"An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2018-06-04 20:29:00","updated_at":"2023-11-07 02:36:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://seclists.org/fulldisclosure/2017/Sep/62","name":"20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10201","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10201","refsource":"CONFIRM","tags":[],"title":"Knowledge Center","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11","refsource":"MISC","tags":[],"title":"Siemens SIMATIC NET CP 443-1 OPC UA | CISA","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html","name":"http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html","refsource":"MISC","tags":[],"title":"FreeBSD Security Advisory - FreeBSD-SA-17:03.ntp ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/","name":"FEDORA-2017-20d54b2782","refsource":"","tags":[],"title":"[SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/","name":"FEDORA-2017-20d54b2782","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us","refsource":"CONFIRM","tags":[],"title":"Document Display | HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded","name":"20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securityfocus.com/bid/97046","name":"97046","refsource":"BID","tags":["Permissions Required","Third Party Advisory","VDB Entry"],"title":"NTP CVE-2016-9042 Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf","refsource":"CONFIRM","tags":[],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"404"},{"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc","name":"FreeBSD-SA-17:03","refsource":"FREEBSD","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/540403/100/0/threaded","name":"20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.f5.com/csp/article/K39041624","name":"https://support.f5.com/csp/article/K39041624","refsource":"CONFIRM","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html","name":"http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html","refsource":"MISC","tags":[],"title":"Slackware Security Advisory - ntp Updates ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/USN-3349-1","name":"USN-3349-1","refsource":"UBUNTU","tags":[],"title":"USN-3349-1: NTP vulnerabilities | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260","name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260","refsource":"MISC","tags":["Exploit","Mitigation","Third Party Advisory"],"title":"TALOS-2016-0260 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bto.bluecoat.com/security-advisory/sa147","name":"https://bto.bluecoat.com/security-advisory/sa147","refsource":"CONFIRM","tags":[],"title":"Broadcom Support Portal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2017/Nov/7","name":"20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1038123","name":"1038123","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1039427","name":"1039427","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Apple macOS/OS X Multiple Flaws Let Remote and Local Users Bypass Security and Deny Service, Local Users Obtain Potentially Sensitive Information, and Applications Gain Elevated Privileges - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded","name":"20170422 [slackware-security] ntp (SSA:2017-112-02)","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/kb/HT208144","name":"https://support.apple.com/kb/HT208144","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS High Sierra 10.13 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-9042","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9042","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hpe","cpe5":"hpux-ntp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.8","cpe7":"p9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.8","cpe7":"p9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"siemens","cpe5":"simatic_net_cp_443-1_opc_ua","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"9042","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"siemens","cpe5":"simatic_net_cp_443-1_opc_ua_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2016-9042","qid":"44030","title":"Juniper Network Operating System (Junos OS) Multiple NTP Vulnerabilities (JSA11171)"},{"cve":"CVE-2016-9042","qid":"590736","title":"Siemens SIMATIC NET CP 443-1 OPC UA Multiple Vulnerabilities (ICSA-21-159-11)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","DATE_PUBLIC":"2017-03-29T00:00:00","ID":"CVE-2016-9042","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Network Time Protocol","version":{"version_data":[{"version_value":"NTP 4.2.8p9"}]}}]},"vendor_name":"Talos"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"denial of service"}]}]},"references":{"reference_data":[{"name":"1038123","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038123"},{"name":"FreeBSD-SA-17:03","refsource":"FREEBSD","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc"},{"name":"1039427","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1039427"},{"name":"97046","refsource":"BID","url":"http://www.securityfocus.com/bid/97046"},{"refsource":"UBUNTU","name":"USN-3349-1","url":"http://www.ubuntu.com/usn/USN-3349-1"},{"refsource":"BUGTRAQ","name":"20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp","url":"http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded"},{"refsource":"FULLDISC","name":"20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","url":"http://seclists.org/fulldisclosure/2017/Nov/7"},{"refsource":"BUGTRAQ","name":"20170412 FreeBSD Security Advisory FreeBSD-SA-17:03.ntp","url":"http://www.securityfocus.com/archive/1/540403/100/0/threaded"},{"refsource":"FEDORA","name":"FEDORA-2017-20d54b2782","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/"},{"refsource":"FULLDISC","name":"20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13","url":"http://seclists.org/fulldisclosure/2017/Sep/62"},{"refsource":"BUGTRAQ","name":"20170422 [slackware-security] ntp (SSA:2017-112-02)","url":"http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded"},{"refsource":"CONFIRM","name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us"},{"name":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260","refsource":"MISC","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html","url":"http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html"},{"refsource":"CONFIRM","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10201","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10201"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT208144","url":"https://support.apple.com/kb/HT208144"},{"refsource":"CONFIRM","name":"https://support.f5.com/csp/article/K39041624","url":"https://support.f5.com/csp/article/K39041624"},{"refsource":"CONFIRM","name":"https://bto.bluecoat.com/security-advisory/sa147","url":"https://bto.bluecoat.com/security-advisory/sa147"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html","url":"http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf"},{"refsource":"MISC","name":"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11","url":"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11"}]},"impact":{"cvss":{"baseScore":3.7,"baseSeverity":"Low","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"}}},"nvd":{"publishedDate":"2018-06-04 20:29:00","lastModifiedDate":"2023-11-07 02:36:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*","versionEndExcluding":"c.4.2.8.4.0","cpe_name":[]}]},{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"9042","Ordinal":"95708","Title":"CVE-2016-9042","CVE":"CVE-2016-9042","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"9042","Ordinal":"1","NoteData":"An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"9042","Ordinal":"2","NoteData":"2018-06-04","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"9042","Ordinal":"3","NoteData":"2021-07-12","Type":"Other","Title":"Modified"}]}}}