CVE-2020-11868
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2020
Last modified:
05/05/2025
Description
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* | 4.2.7 (including) | |
| cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* | 4.3.98 (including) | 4.3.100 (excluding) |
| cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p11:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p12:*:*:*:*:*:* | ||
| cpe:2.3:a:ntp:ntp:4.2.8:p13:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html
- http://support.ntp.org/bin/view/Main/NtpBug3592
- https://bugzilla.redhat.com/show_bug.cgi?id=1716665
- https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html
- https://security.gentoo.org/glsa/202007-12
- https://security.netapp.com/advisory/ntap-20200424-0002/
- https://www.oracle.com//security-alerts/cpujul2021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html
- http://support.ntp.org/bin/view/Main/NtpBug3592
- https://bugzilla.redhat.com/show_bug.cgi?id=1716665
- https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html
- https://security.gentoo.org/glsa/202007-12
- https://security.netapp.com/advisory/ntap-20200424-0002/
- https://www.oracle.com//security-alerts/cpujul2021.html



