CVE-2015-7848

An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ntp:ntp-dev:4.3.70:*:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/77275 - () http://www.securityfocus.com/bid/77275 -
References () http://www.securitytracker.com/id/1033951 - () http://www.securitytracker.com/id/1033951 -
References () http://www.talosintelligence.com/reports/TALOS-2015-0052/ - Exploit, Technical Description, Third Party Advisory, VDB Entry () http://www.talosintelligence.com/reports/TALOS-2015-0052/ - Exploit, Technical Description, Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201607-15 - () https://security.gentoo.org/glsa/201607-15 -
References () https://security.netapp.com/advisory/ntap-20171004-0001/ - () https://security.netapp.com/advisory/ntap-20171004-0001/ -

Information

Published : 2017-01-06 21:59

Updated : 2025-04-20 01:37


NVD link : CVE-2015-7848

Mitre link : CVE-2015-7848

CVE.ORG link : CVE-2015-7848


JSON object : View

Products Affected

ntp

  • ntp-dev
CWE
CWE-190

Integer Overflow or Wraparound