|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for ntp (DLA-2201-1)|
|Summary:||The remote host is missing an update for the 'ntp'; package(s) announced via the DLA-2201-1 advisory.|
The remote host is missing an update for the 'ntp'
package(s) announced via the DLA-2201-1 advisory.
A Denial of Service (DoS) vulnerability was discovered in the network
time protocol server/client, ntp.
ntp allowed an 'off-path' attacker to block unauthenticated
synchronisation via a server mode packet with a spoofed source IP
address because transmissions were rescheduled even if a packet
lacked a valid 'origin timestamp'
'ntp' package(s) on Debian Linux.
For Debian 8 'Jessie', this issue has been fixed in ntp version
We recommend that you upgrade your ntp packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-11868|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.