// For flags

CVE-2009-3563

ntpd: DoS with mode 7 packets (VU#568372)

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

ntp_request.c en ntpd en NTP anterior v4.2.4p8, y v4.2.5, permite a atacantes remotos causar una denegación de servicio (consumo de CPU y ancho de banda) por uso de MODE_PRIVATE para enviar una suplantación de (1) petición o (2) paquete respueta lo que lanza continuo intercambio de errores de respuesta MODE_PRIVATE entre dos demonios NTP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-10-05 CVE Reserved
  • 2009-12-09 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-31 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (45)
URL Tag Source
http://aix.software.ibm.com/aix/efixes/security/xntpd_advisory.asc
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560074
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://lists.vmware.com/pipermail/security-announce/2010/000082.html Mailing List
http://secunia.com/advisories/37629 Third Party Advisory
http://secunia.com/advisories/37922 Third Party Advisory
http://secunia.com/advisories/38764 Third Party Advisory
http://secunia.com/advisories/38794 Third Party Advisory
http://secunia.com/advisories/38832 Third Party Advisory
http://secunia.com/advisories/38834 Third Party Advisory
http://secunia.com/advisories/39593 Third Party Advisory
http://security-tracker.debian.org/tracker/CVE-2009-3563
http://securitytracker.com/id?1023298 Vdb Entry
http://support.avaya.com/css/P8/documents/100071808
http://www.kb.cert.org/vuls/id/MAPG-7X7V6J
http://www.kb.cert.org/vuls/id/MAPG-7X7VD7
http://www.vupen.com/english/advisories/2010/0510 Vdb Entry
http://www.vupen.com/english/advisories/2010/0528 Vdb Entry
http://www.vupen.com/english/advisories/2010/0993 Vdb Entry
https://lists.ntp.org/pipermail/announce/2009-December/000086.html Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11225 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12141 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19376 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7076 Signature
https://support.ntp.org/bugs/show_bug.cgi?id=1331
https://www.kb.cert.org/vuls/id/417980 Third Party Advisory
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
<= 4.2.2p4
Search vendor "Ntp" for product "Ntp" and version " <= 4.2.2p4"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.72
Search vendor "Ntp" for product "Ntp" and version "4.0.72"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.73
Search vendor "Ntp" for product "Ntp" and version "4.0.73"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.90
Search vendor "Ntp" for product "Ntp" and version "4.0.90"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.91
Search vendor "Ntp" for product "Ntp" and version "4.0.91"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.92
Search vendor "Ntp" for product "Ntp" and version "4.0.92"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.93
Search vendor "Ntp" for product "Ntp" and version "4.0.93"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.94
Search vendor "Ntp" for product "Ntp" and version "4.0.94"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.95
Search vendor "Ntp" for product "Ntp" and version "4.0.95"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.96
Search vendor "Ntp" for product "Ntp" and version "4.0.96"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.97
Search vendor "Ntp" for product "Ntp" and version "4.0.97"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.98
Search vendor "Ntp" for product "Ntp" and version "4.0.98"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.99
Search vendor "Ntp" for product "Ntp" and version "4.0.99"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.1.0
Search vendor "Ntp" for product "Ntp" and version "4.1.0"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.1.2
Search vendor "Ntp" for product "Ntp" and version "4.1.2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.0
Search vendor "Ntp" for product "Ntp" and version "4.2.0"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2
Search vendor "Ntp" for product "Ntp" and version "4.2.2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p1
Search vendor "Ntp" for product "Ntp" and version "4.2.2p1"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p2
Search vendor "Ntp" for product "Ntp" and version "4.2.2p2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p3
Search vendor "Ntp" for product "Ntp" and version "4.2.2p3"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.5
Search vendor "Ntp" for product "Ntp" and version "4.2.5"
-
Affected