NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-3349-1 | NTP vulnerabilities |
Ubuntu USN |
USN-3707-2 | NTP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:57:47.647Z
Reserved: 2016-09-09T00:00:00.000Z
Link: CVE-2016-7426
No data.
Status : Modified
Published: 2017-01-13T16:59:00.323
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-7426
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN