ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
[
{
"events": [
{
"introduced": "4.2.0"
},
{
"fixed": "4.2.8"
}
]
},
{
"events": [
{
"introduced": "4.3.0"
},
{
"fixed": "4.3.93"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-beta1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-beta2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-beta3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-beta4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-beta5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p1\\-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p2\\-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p2\\-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p2\\-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p3\\-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p3\\-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p3\\-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.8-p7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "13.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12-sp1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11-sp2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11-sp3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11-sp4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12-sp1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4955.json"