// For flags

CVE-2015-7691

ntp: incomplete checks in ntp_crypto.c

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.

La función crypto_xmit en ntpd en NTP 4.2.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permite que atacantes remotos provoquen una denegación de servicio empleando paquetes manipulados que contengan operaciones de autoclave específicas. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-9750.

It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-10-04 CVE Reserved
  • 2015-10-21 CVE Published
  • 2024-07-10 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
>= 4.2.0 < 4.2.8
Search vendor "Ntp" for product "Ntp" and version " >= 4.2.0 < 4.2.8"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
>= 4.3.0 < 4.3.77
Search vendor "Ntp" for product "Ntp" and version " >= 4.3.0 < 4.3.77"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta4
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta5
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc3
Affected
Oracle
Search vendor "Oracle"
Linux
Search vendor "Oracle" for product "Linux"
6
Search vendor "Oracle" for product "Linux" and version "6"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
7.0
Search vendor "Debian" for product "Debian Linux" and version "7.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Netapp
Search vendor "Netapp"
Oncommand Performance Manager
Search vendor "Netapp" for product "Oncommand Performance Manager"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
-clustered_data_ontap
Affected
Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Affected
Netapp
Search vendor "Netapp"
Data Ontap
Search vendor "Netapp" for product "Data Ontap"
-7-mode
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
6.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Desktop
Search vendor "Redhat" for product "Enterprise Linux Desktop"
7.0
Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
6.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
7.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.4
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.4
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.5
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.3
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.7
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
6.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Workstation
Search vendor "Redhat" for product "Enterprise Linux Workstation"
7.0
Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0"
-
Affected