CVE-2015-5300

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-5300
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2015-5300.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-5300
Related
Published
2017-07-21T14:29:00Z
Modified
2024-09-18T01:00:20Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).

References

Affected packages

Debian:11 / ntp

Package

Name
ntp
Purl
pkg:deb/debian/ntp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.2.8p4+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}