Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.13.2016.326.01
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2016-326-01)
Zusammenfassung:The remote host is missing an update for the 'ntp' package(s) announced via the SSA:2016-326-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the SSA:2016-326-01 advisory.

Vulnerability Insight:
New ntp packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.


Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/ntp-4.2.8p9-i586-1_slack14.2.txz: Upgraded.
In addition to bug fixes and enhancements, this release fixes the
following 1 high- (Windows only :-), 2 medium-, 2 medium-/low, and
5 low-severity vulnerabilities, and provides 28 other non-security
fixes and improvements.
CVE-2016-9311: Trap crash
CVE-2016-9310: Mode 6 unauthenticated trap info disclosure and DDoS vector
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
CVE-2016-7429: Interface selection attack
CVE-2016-7426: Client rate limiting and server responses
CVE-2016-7433: Reboot sync calculation problem
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'ntp' package(s) on Slackware 13.0, Slackware 13.1, Slackware 13.37, Slackware 14.0, Slackware 14.1, Slackware 14.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7426
BugTraq ID: 94451
http://www.securityfocus.com/bid/94451
CERT/CC vulnerability note: VU#633847
https://www.kb.cert.org/vuls/id/633847
FreeBSD Security Advisory: FreeBSD-SA-16:39
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
RedHat Security Advisories: RHSA-2017:0252
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://www.securitytracker.com/id/1037354
https://usn.ubuntu.com/3707-2/
Common Vulnerability Exposure (CVE) ID: CVE-2016-7427
BugTraq ID: 94447
http://www.securityfocus.com/bid/94447
Common Vulnerability Exposure (CVE) ID: CVE-2016-7428
BugTraq ID: 94446
http://www.securityfocus.com/bid/94446
Common Vulnerability Exposure (CVE) ID: CVE-2016-7429
BugTraq ID: 94453
http://www.securityfocus.com/bid/94453
Common Vulnerability Exposure (CVE) ID: CVE-2016-7431
BugTraq ID: 94454
http://www.securityfocus.com/bid/94454
Bugtraq: 20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp (Google Search)
http://www.securityfocus.com/archive/1/539955/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539955/100/0/threaded
Bugtraq: 20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/540254/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540254/100/0/threaded
http://packetstormsecurity.com/files/140240/FreeBSD-Security-Advisory-FreeBSD-SA-16.39.ntp.html
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
SuSE Security Announcement: openSUSE-SU-2016:3280 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html
http://www.ubuntu.com/usn/USN-3349-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-7433
BugTraq ID: 94455
http://www.securityfocus.com/bid/94455
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5E3XBBCK5IXOLDAH2E4M3QKIYIHUMMP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMSYVQMMF37MANYEO7KBHOPSC74EKGN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PABKEYX6ABBFJZGMXKH57X756EJUDS3C/
Common Vulnerability Exposure (CVE) ID: CVE-2016-7434
BugTraq ID: 94448
http://www.securityfocus.com/bid/94448
https://www.exploit-db.com/exploits/40806/
Common Vulnerability Exposure (CVE) ID: CVE-2016-9310
BugTraq ID: 94452
http://www.securityfocus.com/bid/94452
Common Vulnerability Exposure (CVE) ID: CVE-2016-9311
BugTraq ID: 94444
http://www.securityfocus.com/bid/94444
Common Vulnerability Exposure (CVE) ID: CVE-2016-9312
BugTraq ID: 94450
http://www.securityfocus.com/bid/94450
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.