CVE-2015-5194

Loading...

General

Score:5.0/10.0
Severity:Medium
Category:Input Validation Error
Exploit:Available

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2013-5211, CVE-2014-9750, CVE-2015-1798, CVE-2015-1799, CVE-2015-3405, CVE-2015-5146, CVE-2015-5195, CVE-2015-5196, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871, CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, CVE-2015-8139, CVE-2015-8140, CVE-2015-8158, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2016-4957

Published on 21/07/17 - Updated on 18/05/18

Description

The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.

Category: Input Validation Error

CWE-20 (Input Validation)
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Security Notices

US National Vulnerability DatabaseCVE-2015-5194
Amazon Linux ALAS-2015-593
CentOS CESA-2016:0780, CESA-2016:2583
Debian DSA-3388-1
Debian LTSDLA-335-1
Oracle Linux ELSA-2016-0780, ELSA-2016-2583
Redhat RHSA-2016:0780, RHSA-2016:2583
SUSE SUSE-SU-2016:1311, SUSE-SU-2016:1912
Ubuntu USN-2783-1

Exploits

SecurityFocusBID-76475

Relative technologies

VendorProduct
canonicalubuntu_linux
debiandebian_linux
fedoraprojectfedora
ntpntp
redhatenterprise_linux_desktop
redhatenterprise_linux_hpc_node
redhatenterprise_linux_server
redhatenterprise_linux_workstation
suselinux_enterprise_debuginfo
suselinux_enterprise_server
susemanager
susemanager_proxy
suseopenstack_cloud

Share this vulnerability with:

Twitter Facebook LinkedIn Mail