Max CVSS | 7.5 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2014-9296 | 5.0 |
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9293 | 7.5 |
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9294 | 7.5 |
util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9295 | 7.5 |
Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata func
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9751 | 6.8 |
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packe
|
08-09-2021 - 17:19 | 06-10-2015 - 01:59 | |
CVE-2014-9750 | 5.8 |
ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field
|
18-06-2020 - 16:38 | 06-10-2015 - 01:59 |