![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2014-9751 |
Description: | The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.703154 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-9751 BugTraq ID: 72584 http://www.securityfocus.com/bid/72584 CERT/CC vulnerability note: VU#852879 http://www.kb.cert.org/vuls/id/852879 Debian Security Information: DSA-3388 (Google Search) http://www.debian.org/security/2015/dsa-3388 RedHat Security Advisories: RHSA-2015:1459 http://rhn.redhat.com/errata/RHSA-2015-1459.html |