CVE-2015-8138

Published: 31 December 2015

NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.

Priority

Medium

CVSS 3 base score: 5.3

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
Upstream
Released (4.2.8p6)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:4.2.8p4+dfsg-3ubuntu5.3)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
Patches:
Upstream: https://github.com/ntp-project/ntp/commit/880191b72409a1965712999d248d70e6f7163af8
Vendor: http://pkgs.fedoraproject.org/cgit/rpms/ntp.git/tree/ntp-4.2.6p5-cve-2015-8138.patch

Notes

AuthorNote
mdeslaur
fix may be incomplete because of fix for CVE-2015-7704
http://lists.ntp.org/pipermail/hackers/2016-January/007406.html
http://lists.ntp.org/pipermail/hackers/2016-January/007416.html
Ubuntu and Debian use Fedora's fix for CVE-2015-7704, so this
one isn't incomplete.

References

Bugs