CVE-2015-7854
Published: 7 August 2017
Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
Notes
Author | Note |
---|---|
mdeslaur | same patches as CVE-2015-7849 precise to wily don't look vulnerable |
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
ntp Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
precise |
Not vulnerable
|
|
trusty |
Not vulnerable
|
|
vivid |
Not vulnerable
|
|
wily |
Not vulnerable
|
|
Patches: upstream: https://github.com/ntp-project/ntp/commit/9c22e66c8f2be6aa0c846f0d9804db20f93c105d upstream: https://github.com/ntp-project/ntp/commit/1bb401576f412532d8cdcca5509b85ad29605913 |