people.canonical.com
Open in
urlscan Pro
91.189.89.62
Public Scan
URL:
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4954
Submission: On March 17 via api from IL — Scanned from GB
Submission: On March 17 via api from IL — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Ubuntu CVE Tracker * Home * Main * Universe * Partner CVE-2016-4954 Priority Low Description The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954 http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi https://ubuntu.com/security/notices/USN-3096-1 Bugs http://support.ntp.org/bin/view/Main/NtpBug3044 Notes Package Source: ntp (LP Ubuntu Debian) Upstream:needs-triage Ubuntu 16.04 ESM (Xenial Xerus):released (1:4.2.8p4+dfsg-3ubuntu5.3) Ubuntu 14.04 ESM (Trusty Tahr):released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.10) Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected (1:4.2.8p8+dfsg-1ubuntu2) Patches: Vendor:http://pkgs.fedoraproject.org/cgit/rpms/ntp.git/tree/ntp-4.2.6p5-cve-2016-4954.patch More Information * Mitre * NVD * Launchpad * Debian Updated: 2022-02-11 01:24:16 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04) © Canonical Ltd. 2007-2022