CVE-2016-2518

Loading...

General

Score:5.0/10.0
Severity:Medium
Category:Buffer Error

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Relative vulnerabilities

CVE-2013-5211, CVE-2015-1798, CVE-2015-1799, CVE-2015-5194, CVE-2015-5195, CVE-2015-5219, CVE-2015-5300, CVE-2015-7691, CVE-2015-7692, CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7705, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871, CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, CVE-2015-8158, CVE-2016-0727, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2519, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2016-4957, CVE-2016-7426, CVE-2016-7429, CVE-2016-7433, CVE-2016-9310, CVE-2016-9311, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464

Published on 30/01/17 - Updated on 18/05/18

Description

The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.

Category: Buffer Error

CWE-125 (Out-of-bounds Read)
The software reads data past the end, or before the beginning, of the intended buffer.

Security Notices

US National Vulnerability DatabaseCVE-2016-2518
Amazon Linux ALAS-2016-708
Agence Nationale de la Sécurité des Systèmes d'Information CERTFR-2016-AVI-153, CERTFR-2017-AVI-365
CentOS CESA-2016:1141
Debian DSA-3629-1
Debian LTSDLA-559-1
Oracle Linux ELSA-2016-1141, ELSA-2016-2583, ELSA-2017-3071
Redhat RHSA-2016:1141, RHSA-2016:1552
Renater 2016/VULN183
SUSE SUSE-SU-2016:1278, SUSE-SU-2016:1291, SUSE-SU-2016:1471, SUSE-SU-2016:1568, SUSE-SU-2016:1912
Ubuntu USN-3096-1

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
ntpntp

Share this vulnerability with:

Twitter Facebook LinkedIn Mail