// For flags

CVE-2015-7705

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.

La funcionalidad de limitación de velocidad en NTP 4.x en versiones anteriores a la 4.2.8p4 y 4.3.x en versiones anteriores a la 4.3.77 permite que atacantes remotos provoquen errores sin especificar empleando un gran número de peticiones manipuladas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-10-04 CVE Reserved
  • 2015-10-21 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (36)
URL Tag Source
http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html X_refsource_misc
http://www.securityfocus.com/archive/1/536737/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/536796/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/archive/1/536737/100/100/threaded Mailing List
http://www.securityfocus.com/archive/1/archive/1/536796/100/100/threaded Mailing List
http://www.securityfocus.com/bid/77284 Third Party Advisory
http://www.securitytracker.com/id/1033951 Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa103 X_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1274184 Issue Tracking
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf X_refsource_confirm
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf Third Party Advisory
https://eprint.iacr.org/2015/1020.pdf Technical Description
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839 Third Party Advisory
https://security.netapp.com/advisory/ntap-20171004-0001 Third Party Advisory
https://support.citrix.com/article/CTX220112 Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 X_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016 X_refsource_misc
https://www.cs.bu.edu/~goldbe/NTPattack.html Not Applicable
https://www.kb.cert.org/vuls/id/718152 Third Party Advisory
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Tim 4r-ie Firmware
Search vendor "Siemens" for product "Tim 4r-ie Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Tim 4r-ie
Search vendor "Siemens" for product "Tim 4r-ie"
--
Safe
Siemens
Search vendor "Siemens"
Tim 4r-ie Dnp3 Firmware
Search vendor "Siemens" for product "Tim 4r-ie Dnp3 Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Tim 4r-ie Dnp3
Search vendor "Siemens" for product "Tim 4r-ie Dnp3"
--
Safe
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
>= 4.2.0 < 4.2.8
Search vendor "Ntp" for product "Ntp" and version " >= 4.2.0 < 4.2.8"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
>= 4.3.0 < 4.3.77
Search vendor "Ntp" for product "Ntp" and version " >= 4.3.0 < 4.3.77"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta4
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-beta5
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p1-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p2-rc3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc2
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.8
Search vendor "Ntp" for product "Ntp" and version "4.2.8"
p3-rc3
Affected
Netapp
Search vendor "Netapp"
Oncommand Performance Manager
Search vendor "Netapp" for product "Oncommand Performance Manager"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager
Search vendor "Netapp" for product "Oncommand Unified Manager"
-clustered_data_ontap
Affected
Netapp
Search vendor "Netapp"
Clustered Data Ontap
Search vendor "Netapp" for product "Clustered Data Ontap"
--
Affected
Netapp
Search vendor "Netapp"
Data Ontap
Search vendor "Netapp" for product "Data Ontap"
-7-mode
Affected
Citrix
Search vendor "Citrix"
Xenserver
Search vendor "Citrix" for product "Xenserver"
6.0.2
Search vendor "Citrix" for product "Xenserver" and version "6.0.2"
-
Affected
Citrix
Search vendor "Citrix"
Xenserver
Search vendor "Citrix" for product "Xenserver"
6.2.0
Search vendor "Citrix" for product "Xenserver" and version "6.2.0"
-
Affected
Citrix
Search vendor "Citrix"
Xenserver
Search vendor "Citrix" for product "Xenserver"
6.5
Search vendor "Citrix" for product "Xenserver" and version "6.5"
-
Affected
Citrix
Search vendor "Citrix"
Xenserver
Search vendor "Citrix" for product "Xenserver"
7.0
Search vendor "Citrix" for product "Xenserver" and version "7.0"
-
Affected