Max CVSS | 7.5 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2013-5211 | 5.0 |
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 20
|
01-11-2023 - 12:51 | 02-01-2014 - 14:59 | |
CVE-2014-9296 | 5.0 |
The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9293 | 7.5 |
The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9294 | 7.5 |
util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 | |
CVE-2014-9295 | 7.5 |
Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata func
|
17-11-2021 - 22:15 | 20-12-2014 - 02:59 |