CVE-2016-4957
high-risk
Published 2016-07-05
ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
Do I need to act?
!
59.1% chance of exploitation in next 30 days
EPSS score — higher than 41% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (14)
References (26)
Issue Tracking
http://bugs.ntp.org/3046
Release Notes
http://support.ntp.org/bin/view/Main/SecurityNotice
Third Party Advisory
http://www.kb.cert.org/vuls/id/321640
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Third Party Advisory
http://www.securitytracker.com/id/1036037
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:24.ntp.asc
Third Party Advisory
https://security.gentoo.org/glsa/201607-15
Issue Tracking
http://bugs.ntp.org/3046
and 6 more references
62
/ 100
high-risk
Severity
26/34 · High
Exploitability
18/34 · Moderate
Exposure
18/34 · Moderate