CVE-2015-7848
high-risk
Published 2017-01-06
An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Data Ontap Operating In 7-Mode
References (10)
Broken Link
http://www.securityfocus.com/bid/77275
Broken Link
http://www.securitytracker.com/id/1033951
Third Party Advisory
https://security.gentoo.org/glsa/201607-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20171004-0001/
Broken Link
http://www.securityfocus.com/bid/77275
Broken Link
http://www.securitytracker.com/id/1033951
Third Party Advisory
https://security.gentoo.org/glsa/201607-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20171004-0001/
51
/ 100
high-risk
Severity
26/34 · High
Exploitability
4/34 · Minimal
Exposure
21/34 · High