people.canonical.com Open in urlscan Pro
91.189.89.62  Public Scan

URL: https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4954
Submission: On March 17 via api from IL — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Ubuntu CVE Tracker
 * Home
 * Main
 * Universe
 * Partner


CVE-2016-4954

Priority
Low

Description
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before
4.2.8p8 allows remote attackers to cause a denial of service (peer-variable
modification) by sending spoofed packets from many source IP addresses in a
certain scenario, as demonstrated by triggering an incorrect leap
indication.

References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
https://ubuntu.com/security/notices/USN-3096-1

Bugs
http://support.ntp.org/bin/view/Main/NtpBug3044

Notes



Package
Source: ntp (LP Ubuntu Debian)

Upstream:needs-triage Ubuntu 16.04 ESM (Xenial Xerus):released
(1:4.2.8p4+dfsg-3ubuntu5.3) Ubuntu 14.04 ESM (Trusty Tahr):released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.10) Ubuntu 20.04 FIPS Compliant (Focal
Fossa):not-affected (1:4.2.8p8+dfsg-1ubuntu2)

Patches:

Vendor:http://pkgs.fedoraproject.org/cgit/rpms/ntp.git/tree/ntp-4.2.6p5-cve-2016-4954.patch

More Information
 * Mitre
 * NVD
 * Launchpad
 * Debian

Updated: 2022-02-11 01:24:16 UTC (commit
acb3d89ab51f1d5e5543fa993969c0eb13c71f04)

© Canonical Ltd. 2007-2022