This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Ntp First view 2004-08-06
Product Ntp Last view 2023-04-11
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:ntp:ntp:-:*:*:*:*:*:*:* 68
cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* 67
cpe:2.3:a:ntp:ntp:4.0.73:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.72:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.91:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.98:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.99:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2p1:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2p4:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.97:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4p2:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.94:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2:p2:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2:p1:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2:p3:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2:p4:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.93:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2p3:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.92:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4p1:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.2p2:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4p3:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.95:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.96:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.0.90:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4p0:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.1.0:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4p4:*:*:*:*:*:*:* 66
cpe:2.3:a:ntp:ntp:4.2.4:p5:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc4:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc3:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc2:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc1:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p8:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p6:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc6:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc5:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p7_rc7:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4p5:*:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:*:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p0:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p4:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p3:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p2:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4:p1:*:*:*:*:*:* 65
cpe:2.3:a:ntp:ntp:4.2.4p6:*:*:*:*:*:*:* 65

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.4 2023-04-11 CVE-2023-26555

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

5.6 2023-04-11 CVE-2023-26554

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

5.6 2023-04-11 CVE-2023-26553

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

5.6 2023-04-11 CVE-2023-26552

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

5.6 2023-04-11 CVE-2023-26551

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp

4.9 2020-06-24 CVE-2020-15025

ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.

7.4 2020-06-04 CVE-2020-13817

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.

5.3 2020-05-06 CVE-2018-8956

ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.

7.5 2020-04-17 CVE-2020-11868

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.

6.5 2020-01-28 CVE-2015-7851

Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.

5.3 2020-01-08 CVE-2014-5209

An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information.

7.5 2019-05-15 CVE-2019-8936

NTP through 4.2.8p12 has a NULL Pointer Dereference.

8.1 2019-04-18 CVE-2019-11331

Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.

9.8 2018-06-20 CVE-2018-12327

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

5.9 2018-06-04 CVE-2016-9042

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.

9.8 2018-03-08 CVE-2018-7183

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

7.5 2018-03-06 CVE-2018-7185

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

7.5 2018-03-06 CVE-2018-7184

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

7.5 2018-03-06 CVE-2018-7182

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

5.3 2018-03-06 CVE-2018-7170

ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.

5.3 2017-08-24 CVE-2015-5146

ntpd in ntp before 4.2.8p3 with remote configuration enabled allows remote authenticated users with knowledge of the configuration password and access to a computer entrusted to perform remote configuration to cause a denial of service (service crash) via a NULL byte in a crafted configuration directive packet.

7.5 2017-08-09 CVE-2015-3405

ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.

9.8 2017-08-07 CVE-2015-7871

Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.

6.5 2017-08-07 CVE-2015-7855

The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.

8.8 2017-08-07 CVE-2015-7854

Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
27% (24) CWE-20 Improper Input Validation
11% (10) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
9% (8) CWE-787 Out-of-bounds Write
5% (5) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
4% (4) CWE-476 NULL Pointer Dereference
4% (4) CWE-287 Improper Authentication
3% (3) CWE-254 Security Features
3% (3) CWE-19 Data Handling
3% (3) CWE-17 Code
2% (2) CWE-362 Race Condition
2% (2) CWE-284 Access Control (Authorization) Issues
2% (2) CWE-200 Information Exposure
2% (2) CWE-125 Out-of-bounds Read
2% (2) CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflo...
1% (1) CWE-772 Missing Release of Resource after Effective Lifetime
1% (1) CWE-704 Incorrect Type Conversion or Cast
1% (1) CWE-682 Incorrect Calculation
1% (1) CWE-416 Use After Free
1% (1) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
1% (1) CWE-399 Resource Management Errors
1% (1) CWE-361 Time and State
1% (1) CWE-346 Origin Validation Error
1% (1) CWE-331 Insufficient Entropy
1% (1) CWE-330 Use of Insufficiently Random Values
1% (1) CWE-190 Integer Overflow or Wraparound

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:7079 DSA-1702 ntp -- interpretation conflict
oval:org.mitre.oval:def:13964 USN-705-1 -- ntp vulnerability
oval:org.mitre.oval:def:13252 DSA-1702-1 ntp -- interpretation conflict
oval:org.mitre.oval:def:10035 NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check t...
oval:org.mitre.oval:def:22471 ELSA-2009:0046: ntp security update (Moderate)
oval:org.mitre.oval:def:28923 RHSA-2009:0046 -- ntp security update (Moderate)
oval:org.mitre.oval:def:9634 Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntp...
oval:org.mitre.oval:def:8665 VMware ntpd stack-based buffer overflow vulnerability
oval:org.mitre.oval:def:8386 VMware ntpq stack-based buffer overflow vulnerability
oval:org.mitre.oval:def:5411 HP-UX Running XNTP, Remote Execution of Arbitrary Code
oval:org.mitre.oval:def:19392 HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary...
oval:org.mitre.oval:def:8042 DSA-1801 ntp -- buffer overflows
oval:org.mitre.oval:def:6307 HP-UX Running XNTP, Remote Execution of Arbitrary Code
oval:org.mitre.oval:def:13464 DSA-1801-1 ntp -- buffer overflows
oval:org.mitre.oval:def:13106 USN-777-1 -- ntp vulnerabilities
oval:org.mitre.oval:def:11231 Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in nt...
oval:org.mitre.oval:def:22874 ELSA-2009:1039: ntp security update (Important)
oval:org.mitre.oval:def:29463 RHSA-2009:1039 -- ntp security update (Important)
oval:org.mitre.oval:def:7379 DSA-1948 ntp -- denial of service
oval:org.mitre.oval:def:7310 DSA-1992 chrony -- several vulnerabilities
oval:org.mitre.oval:def:7076 NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
oval:org.mitre.oval:def:19376 HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary...
oval:org.mitre.oval:def:17673 DSA-1948-1 ntp - denial of service
oval:org.mitre.oval:def:13488 USN-867-1 -- ntp vulnerability
oval:org.mitre.oval:def:12783 DSA-1992-1 chrony -- several

Open Source Vulnerability Database (OSVDB)

id Description
60847 NTP ntpd Mode 7 Request Crafted Packet Reply Loop Remote DoS
54576 NTP ntpd/ntp_crypto.c crypto_recv() Function Remote Overflow
53593 NTP ntpq/ntpq.c cookedprint() Function Remote Overflow
51164 OpenSSL EVP_VerifyFinal Function DSA / ECDSA Key Validation Weakness
15975 NTP ntpd Date/Time Request Remote Overflow

ExploitDB Exploits

id Description
33073 NTP ntpd monlist Query Reflection - Denial of Service

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-04-16 Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates
File : nvt/gb_VMSA-2010-0009.nasl
2011-08-09 Name : CentOS Update for ntp CESA-2009:0046 centos5 i386
File : nvt/gb_CESA-2009_0046_ntp_centos5_i386.nasl
2011-08-09 Name : CentOS Update for ntp CESA-2009:1039 centos5 i386
File : nvt/gb_CESA-2009_1039_ntp_centos5_i386.nasl
2011-08-09 Name : CentOS Update for ntp CESA-2009:1651 centos3 i386
File : nvt/gb_CESA-2009_1651_ntp_centos3_i386.nasl
2011-08-09 Name : CentOS Update for ntp CESA-2009:1648 centos5 i386
File : nvt/gb_CESA-2009_1648_ntp_centos5_i386.nasl
2011-08-09 Name : CentOS Update for ntp CESA-2009:1648 centos4 i386
File : nvt/gb_CESA-2009_1648_ntp_centos4_i386.nasl
2011-06-06 Name : HP-UX Update for XNTP HPSBUX02639
File : nvt/gb_hp_ux_HPSBUX02639.nasl
2010-05-12 Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl
2010-02-10 Name : Debian Security Advisory DSA 1992-1 (chrony)
File : nvt/deb_1992_1.nasl
2010-01-11 Name : FreeBSD Security Advisory (FreeBSD-SA-10:02.ntpd.asc)
File : nvt/freebsdsa_ntpd2.nasl
2010-01-07 Name : Gentoo Security Advisory GLSA 201001-01 (ntp)
File : nvt/glsa_201001_01.nasl
2009-12-15 Name : NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
File : nvt/ntp_37255.nasl
2009-12-14 Name : CentOS Security Advisory CESA-2009:1651 (ntp)
File : nvt/ovcesa2009_1651.nasl
2009-12-14 Name : CentOS Security Advisory CESA-2009:1648 (ntp)
File : nvt/ovcesa2009_1648.nasl
2009-12-14 Name : Fedora Core 12 FEDORA-2009-13046 (ntp)
File : nvt/fcore_2009_13046.nasl
2009-12-14 Name : Fedora Core 11 FEDORA-2009-13090 (ntp)
File : nvt/fcore_2009_13090.nasl
2009-12-14 Name : Fedora Core 10 FEDORA-2009-13121 (ntp)
File : nvt/fcore_2009_13121.nasl
2009-12-14 Name : Debian Security Advisory DSA 1948-1 (ntp)
File : nvt/deb_1948_1.nasl
2009-12-14 Name : RedHat Security Advisory RHSA-2009:1651
File : nvt/RHSA_2009_1651.nasl
2009-12-14 Name : RedHat Security Advisory RHSA-2009:1648
File : nvt/RHSA_2009_1648.nasl
2009-12-10 Name : Mandriva Security Advisory MDVSA-2009:309 (ntp)
File : nvt/mdksa_2009_309.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-10-13 Name : Solaris Update for usr/sbin/ntpq 141396-01
File : nvt/gb_solaris_141396_01.nasl
2009-10-13 Name : SLES10: Security update for xntp
File : nvt/sles10_xntp.nasl
2009-10-13 Name : SLES10: Security update for xntp
File : nvt/sles10_xntp0.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0150 Multiple Security Vulnerabilities in Juniper Networks CTPView
Severity: Category I - VMSKEY: V0061073
2015-A-0113 Multiple Vulnerabilities in Juniper Networks CTPOS
Severity: Category I - VMSKEY: V0060737
2015-A-0041 Multiple Vulnerabilities in Network Time Protocol (NTP)
Severity: Category I - VMSKEY: V0058907

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2018-09-19 ntpq decode array buffer overflow attempt
RuleID : 47585 - Type : SERVER-OTHER - Revision : 4
2018-05-22 Multiple Vendors NTP zero-origin timestamp denial of service attempt
RuleID : 46387 - Type : SERVER-OTHER - Revision : 3
2018-03-23 NTP crypto-NAK denial of service attempt
RuleID : 45693 - Type : SERVER-OTHER - Revision : 3
2018-05-23 SSDP M-SEARCH ssdp-all potential amplified distributed denial-of-service attempt
RuleID : 45157-community - Type : SERVER-OTHER - Revision : 4
2018-01-11 SSDP M-SEARCH ssdp-all potential amplified distributed denial-of-service attempt
RuleID : 45157 - Type : SERVER-OTHER - Revision : 4
2017-12-13 NTP crypto-NAK denial of service attempt
RuleID : 44756 - Type : SERVER-OTHER - Revision : 3
2017-06-16 ntpq flagstr buffer overflow attempt
RuleID : 42887 - Type : SERVER-OTHER - Revision : 3
2017-05-16 NTP malformed config request denial of service attempt
RuleID : 42235 - Type : SERVER-OTHER - Revision : 3
2017-05-16 NTP Config Unpeer denial of service attempt
RuleID : 42227 - Type : SERVER-OTHER - Revision : 3
2017-01-25 NTPD zero origin timestamp denial of service attempt
RuleID : 41367 - Type : SERVER-OTHER - Revision : 6
2017-01-04 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40897 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40864 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40863 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40862 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40861 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40860 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40859 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40858 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40857 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40856 - Type : SERVER-OTHER - Revision : 3
2016-12-29 ntpd mrulist control message command null pointer dereference attempt
RuleID : 40855 - Type : SERVER-OTHER - Revision : 3
2016-12-20 NTP origin timestamp denial of service attempt
RuleID : 40811 - Type : SERVER-OTHER - Revision : 4
2016-03-14 NTP crypto-NAK possible DoS attempt
RuleID : 37843 - Type : SERVER-OTHER - Revision : 4
2016-03-14 ntpd reference clock impersonation attempt
RuleID : 37842 - Type : SERVER-OTHER - Revision : 4
2016-03-14 ntpd reference clock impersonation attempt
RuleID : 37841 - Type : SERVER-OTHER - Revision : 4

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-08 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2019-1014.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-e585e25b72.nasl - Type: ACT_GATHER_INFO
2018-12-20 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-3854.nasl - Type: ACT_GATHER_INFO
2018-11-27 Name: The remote Virtuozzo host is missing a security update.
File: Virtuozzo_VZLSA-2017-3071.nasl - Type: ACT_GATHER_INFO
2018-09-20 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1083.nasl - Type: ACT_GATHER_INFO
2018-08-31 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0180.nasl - Type: ACT_GATHER_INFO
2018-08-31 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-2_0-0088.nasl - Type: ACT_GATHER_INFO
2018-08-20 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-229-01.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0003.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2017-0010.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote PhotonOS host is missing multiple security updates.
File: PhotonOS_PHSA-2018-1_0-0167.nasl - Type: ACT_GATHER_INFO
2018-08-17 Name: The remote NTP server is affected by multiple vulnerabilities.
File: ntp_4_2_8p12.nasl - Type: ACT_GATHER_INFO
2018-05-29 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201805-12.nasl - Type: ACT_GATHER_INFO
2018-05-11 Name: The remote Amazon Linux 2 host is missing a security update.
File: al2_ALAS-2018-1009.nasl - Type: ACT_GATHER_INFO
2018-05-11 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1009.nasl - Type: ACT_GATHER_INFO
2018-04-27 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0855.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20150408-ntpd-ios.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20150408-ntpd-iosxe.nasl - Type: ACT_GATHER_INFO
2018-03-09 Name: The remote NTP server is affected by multiple vulnerabilities.
File: ntp_4_2_8p11.nasl - Type: ACT_GATHER_INFO
2018-03-02 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-060-02.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The version of Arista Networks EOS running on the remote device is affected b...
File: arista_eos_sa0019.nasl - Type: ACT_GATHER_INFO
2018-02-28 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_af485ef41c5811e88477d05099c0ae8c.nasl - Type: ACT_GATHER_INFO
2018-01-03 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL17114.nasl - Type: ACT_GATHER_INFO
2017-12-28 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL99254031.nasl - Type: ACT_GATHER_INFO
2017-12-21 Name: The remote device is missing a vendor-supplied security patch.
File: f5_bigip_SOL02951273.nasl - Type: ACT_GATHER_INFO