CVE-2016-7433
Publication date 13 January 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
Status
Package | Ubuntu Release | Status |
---|---|---|
ntp | ||
16.04 LTS xenial |
Fixed 1:4.2.8p4+dfsg-3ubuntu5.5
|
|
14.04 LTS trusty |
Not affected
|
|
Notes
mdeslaur
ntp-4.2.7p385, up to but not including ntp-4.2.8p9, and ntp-4.3.0 up to, but not including ntp-4.3.94. But the root-distance calculation in general is incorrect in all versions of ntp-4 until this release.
leosilva
for precise it's not needed since this issue seems to be caused by some regression and precise hasn't the code affect changed.
mdeslaur
trusty isn't vulnerable either
Patch details
Package | Patch details |
---|---|
ntp |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-3349-1
- NTP vulnerabilities
- 5 July 2017