CVE-2015-7703
high-risk
Published 2017-07-24
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
Do I need to act?
~
8.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (20)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0780.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2583.html
Vendor Advisory
http://support.ntp.org/bin/view/Main/NtpBug2902
Third Party Advisory
http://www.debian.org/security/2015/dsa-3388
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.securityfocus.com/bid/77278
Third Party Advisory
http://www.securitytracker.com/id/1033951
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1254547
Third Party Advisory
https://security.gentoo.org/glsa/201607-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20171004-0001/
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0780.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2583.html
Vendor Advisory
http://support.ntp.org/bin/view/Main/NtpBug2902
Third Party Advisory
http://www.debian.org/security/2015/dsa-3388
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.securityfocus.com/bid/77278
Third Party Advisory
http://www.securitytracker.com/id/1033951
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1254547
Third Party Advisory
https://security.gentoo.org/glsa/201607-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20171004-0001/
61
/ 100
high-risk
Severity
26/34 · High
Exploitability
10/34 · Low
Exposure
25/34 · High