Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-9042


An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.


Published

2018-06-04T20:29:00.417

Last Modified

2024-11-21T03:00:29.693

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ntp ntp 4.2.8 Yes
Operating System freebsd freebsd 10.0 Yes
Operating System freebsd freebsd 11.0 Yes
Application hpe hpux-ntp < c.4.2.8.4.0 Yes
Operating System siemens simatic_net_cp_443-1_opc_ua_firmware * Yes
Hardware siemens simatic_net_cp_443-1_opc_ua - No

References