CVE-2016-9042
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
04/06/2018
Last modified:
07/11/2023
Description
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:* | c.4.2.8.4.0 (excluding) | |
| cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/142101/FreeBSD-Security-Advisory-FreeBSD-SA-17-03.ntp.html
- http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- http://seclists.org/fulldisclosure/2017/Nov/7
- http://seclists.org/fulldisclosure/2017/Sep/62
- http://www.securityfocus.com/archive/1/540403/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540403/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
- http://www.securityfocus.com/bid/97046
- http://www.securitytracker.com/id/1038123
- http://www.securitytracker.com/id/1039427
- http://www.ubuntu.com/usn/USN-3349-1
- https://bto.bluecoat.com/security-advisory/sa147
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://kc.mcafee.com/corporate/index?page=content&id=SB10201
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
- https://support.apple.com/kb/HT208144
- https://support.f5.com/csp/article/K39041624
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0260



