ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202007-12 | third party advisory vendor advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory patch |
http://support.ntp.org/bin/view/Main/NtpBug3592 | patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1716665 | issue tracking third party advisory |
https://security.netapp.com/advisory/ntap-20200424-0002/ | third party advisory |