ALT-BU-2017-3379-1
Branch c8 update bulletin.
Package dosfstools updated to version 4.1-alt0.M80C.1 for branch c8 in task 188759.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-8872
The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
- openSUSE-SU-2016:1461
- openSUSE-SU-2016:1461
- openSUSE-SU-2016:2233
- openSUSE-SU-2016:2233
- 90311
- 90311
- USN-2986-1
- USN-2986-1
- https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html
- https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html
- https://github.com/dosfstools/dosfstools/commit/07908124838afcc99c577d1d3e84cef2dbd39cb7
- https://github.com/dosfstools/dosfstools/commit/07908124838afcc99c577d1d3e84cef2dbd39cb7
- https://github.com/dosfstools/dosfstools/issues/12
- https://github.com/dosfstools/dosfstools/issues/12
- https://github.com/dosfstools/dosfstools/releases/tag/v4.0
- https://github.com/dosfstools/dosfstools/releases/tag/v4.0
- [debian-lts-announce] 20200530 [SECURITY] [DLA 2224-1] dosfstools security update
- [debian-lts-announce] 20200530 [SECURITY] [DLA 2224-1] dosfstools security update
Modified: 2024-11-21
CVE-2016-4804
The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
- openSUSE-SU-2016:1461
- openSUSE-SU-2016:1461
- openSUSE-SU-2016:2233
- openSUSE-SU-2016:2233
- 90311
- 90311
- USN-2986-1
- USN-2986-1
- https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html
- https://blog.fuzzing-project.org/44-dosfstools-fsck.vfat-Several-invalid-memory-accesses.html
- https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52
- https://github.com/dosfstools/dosfstools/commit/e8eff147e9da1185f9afd5b25948153a3b97cf52
- https://github.com/dosfstools/dosfstools/issues/25
- https://github.com/dosfstools/dosfstools/issues/25
- https://github.com/dosfstools/dosfstools/issues/26
- https://github.com/dosfstools/dosfstools/issues/26
- [debian-lts-announce] 20200530 [SECURITY] [DLA 2224-1] dosfstools security update
- [debian-lts-announce] 20200530 [SECURITY] [DLA 2224-1] dosfstools security update
Package libarchive updated to version 3.3.1-alt0.M80C.1 for branch c8 in task 188910.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-8687
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
- openSUSE-SU-2016:3002
- openSUSE-SU-2016:3002
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- 93781
- 93781
- 1037668
- 1037668
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-stack-based-buffer-overflow-in-bsdtar_expand_char-util-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-stack-based-buffer-overflow-in-bsdtar_expand_char-util-c/
- https://bugzilla.redhat.com/show_bug.cgi?id=1377926
- https://bugzilla.redhat.com/show_bug.cgi?id=1377926
- https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
- https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- GLSA-201701-03
- GLSA-201701-03
Modified: 2024-11-21
CVE-2016-8688
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
- openSUSE-SU-2016:3002
- openSUSE-SU-2016:3002
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- 93781
- 93781
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-detect_form-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-memory-corruptionunknown-crash-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-bid_entry-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-use-after-free-in-detect_form-archive_read_support_format_mtree-c/
- https://bugzilla.redhat.com/show_bug.cgi?id=1377923
- https://bugzilla.redhat.com/show_bug.cgi?id=1377923
- https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
- https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- GLSA-201701-03
- GLSA-201701-03
Modified: 2024-11-21
CVE-2016-8689
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
- openSUSE-SU-2016:3002
- openSUSE-SU-2016:3002
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- [oss-security] 20161015 Re: Libarchive/bsdtar: multiple crashes
- 93781
- 93781
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-read_header-archive_read_support_format_7zip-c/
- https://blogs.gentoo.org/ago/2016/09/11/libarchive-bsdtar-heap-based-buffer-overflow-in-read_header-archive_read_support_format_7zip-c/
- https://bugzilla.redhat.com/show_bug.cgi?id=1377925
- https://bugzilla.redhat.com/show_bug.cgi?id=1377925
- https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
- https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- [debian-lts-announce] 20181129 [SECURITY] [DLA 1600-1] libarchive security update
- GLSA-201701-03
- GLSA-201701-03
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6414
Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.
- [oss-security] 20170301 CVE-2017-6414 Qemu: libcacard: host memory leakage while creating new APDU
- [oss-security] 20170301 CVE-2017-6414 Qemu: libcacard: host memory leakage while creating new APDU
- 96541
- 96541
- RHSA-2017:2408
- RHSA-2017:2408
- https://bugzilla.redhat.com/show_bug.cgi?id=1427833
- https://bugzilla.redhat.com/show_bug.cgi?id=1427833
- https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c
- https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c
- https://cgit.freedesktop.org/spice/libcacard/tree/NEWS?id=aaa5251791bf0b1640afcba77a7d79ea23c42d53
- https://cgit.freedesktop.org/spice/libcacard/tree/NEWS?id=aaa5251791bf0b1640afcba77a7d79ea23c42d53
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7960
The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
- openSUSE-SU-2019:1575
- openSUSE-SU-2019:1575
- https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/
- https://blogs.gentoo.org/ago/2017/04/17/libcroco-heap-overflow-and-undefined-behavior/
- https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
- https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
- GLSA-201707-13
- GLSA-201707-13
Package libimobiledevice updated to version 1.2.0-alt2.M80C.1 for branch c8 in task 188923.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-5104
The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
- SUSE-SU-2016:1639
- SUSE-SU-2016:1639
- openSUSE-SU-2016:1526
- openSUSE-SU-2016:1526
- [oss-security] 20160525 CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160525 CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160526 Re: CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160526 Re: CVE Requests: libimobiledevice and libusbmuxd
- USN-3026-1
- USN-3026-1
- USN-3026-2
- USN-3026-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2121-1] libimobiledevice security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2121-1] libimobiledevice security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2122-1] libusbmuxd security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2122-1] libusbmuxd security update
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-10082
A vulnerability classified as problematic has been found in UIKit0 libplist 1.12. This affects the function plist_from_xml of the file src/xplist.c of the component XML Handler. The manipulation leads to xml external entity reference. The patch is named c086cb139af7c82845f6d565e636073ff4b37440. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221499.
Modified: 2024-11-21
CVE-2017-5209
The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
- 95385
- 95385
- https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957
- https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-5545
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
- 95702
- 95702
- https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee
- https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee
- https://github.com/libimobiledevice/libplist/issues/87
- https://github.com/libimobiledevice/libplist/issues/87
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-5834
The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- 96022
- 96022
- https://github.com/libimobiledevice/libplist/issues/89
- https://github.com/libimobiledevice/libplist/issues/89
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-5835
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- 96022
- 96022
- https://github.com/libimobiledevice/libplist/issues/88
- https://github.com/libimobiledevice/libplist/issues/88
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-5836
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170131 CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- [oss-security] 20170202 Re: CVE request: multiples vulnerabilities in libplist
- 96022
- 96022
- https://github.com/libimobiledevice/libplist/issues/86
- https://github.com/libimobiledevice/libplist/issues/86
Modified: 2024-11-21
CVE-2017-6435
The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory corruption) via a crafted plist file.
- 97586
- 97586
- https://github.com/libimobiledevice/libplist/commit/fbd8494d5e4e46bf2e90cb6116903e404374fb56
- https://github.com/libimobiledevice/libplist/commit/fbd8494d5e4e46bf2e90cb6116903e404374fb56
- https://github.com/libimobiledevice/libplist/issues/93
- https://github.com/libimobiledevice/libplist/issues/93
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-6436
The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
- 97290
- 97290
- https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
- https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
- https://github.com/libimobiledevice/libplist/issues/94
- https://github.com/libimobiledevice/libplist/issues/94
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-6437
The base64encode function in base64.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds read) via a crafted plist file.
Modified: 2024-11-21
CVE-2017-6438
Heap-based buffer overflow in the parse_unicode_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) and possibly code execution via a crafted plist file.
Modified: 2024-11-21
CVE-2017-6439
Heap-based buffer overflow in the parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) via a crafted plist file.
- 97278
- 97278
- https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
- https://github.com/libimobiledevice/libplist/commit/32ee5213fe64f1e10ec76c1ee861ee6f233120dd
- https://github.com/libimobiledevice/libplist/issues/95
- https://github.com/libimobiledevice/libplist/issues/95
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
- [debian-lts-announce] 20200402 [SECURITY] [DLA 2168-1] libplist security update
Modified: 2024-11-21
CVE-2017-6440
The parse_data_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
Modified: 2024-11-21
CVE-2017-7982
Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
Package libsndfile updated to version 1.0.28-alt0.M80C.1 for branch c8 in task 188926.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7585
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- http://www.mega-nerd.com/libsndfile/NEWS
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-4/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-4/
- GLSA-201707-04
- GLSA-201707-04
Modified: 2024-11-21
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/#History
- http://www.mega-nerd.com/libsndfile/NEWS
- http://www.mega-nerd.com/libsndfile/NEWS
- 97522
- 97522
- https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
- https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
- https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
- https://github.com/erikd/libsndfile/commit/f457b7b5ecfe91697ed01cfc825772c4d8de1236
- GLSA-201707-04
- GLSA-201707-04
Modified: 2024-11-21
CVE-2017-7741
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- GLSA-201707-04
- GLSA-201707-04
Modified: 2024-11-21
CVE-2017-7742
In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://blogs.gentoo.org/ago/2017/04/11/libsndfile-invalid-memory-read-and-invalid-memory-write-in/
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- https://github.com/erikd/libsndfile/commit/60b234301adf258786d8b90be5c1d437fc8799e0
- GLSA-201707-04
- GLSA-201707-04
Closed vulnerabilities
BDU:2017-02016
Уязвимость параметра datalen драйвера refclock протокола сетевого времени NTP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2017-02017
Уязвимость службы ограничения скорости протокола сетевого времени NTP, позволяющая нарушителю вызвать частичное нарушение конфиденциальности, целостности и доступности защищаемой информации
BDU:2017-02039
Уязвимость функции CRYPTO_ASSOC демон-программы ntpd протокола сетевого времени NTP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00217
Уязвимость демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками управления ключами, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-04147
Уязвимость опции unpeer реализации протокола синхронизации времени NTP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04148
Уязвимость реализации протокола синхронизации времени NTP, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04149
Уязвимость драйвера Datum Programmable Time Server (DPTS) refclock реализации протокола синхронизации времени NTP, позволяющая нарушителю вызвать отказ в работе демона ntpd с помощью созданного устройства /dev/datum
Modified: 2024-11-21
CVE-2014-9750
ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
- http://bugs.ntp.org/show_bug.cgi?id=2671
- http://bugs.ntp.org/show_bug.cgi?id=2671
- RHSA-2015:1459
- RHSA-2015:1459
- http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne
- http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne
- DSA-3388
- DSA-3388
- VU#852879
- VU#852879
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72583
- 72583
- https://bugzilla.redhat.com/show_bug.cgi?id=1184573
- https://bugzilla.redhat.com/show_bug.cgi?id=1184573
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
Modified: 2024-11-21
CVE-2015-5146
ntpd in ntp before 4.2.8p3 with remote configuration enabled allows remote authenticated users with knowledge of the configuration password and access to a computer entrusted to perform remote configuration to cause a denial of service (service crash) via a NULL byte in a crafted configuration directive packet.
- http://bugs.ntp.org/show_bug.cgi?id=2853
- http://bugs.ntp.org/show_bug.cgi?id=2853
- FEDORA-2015-77bfbc1bcd
- FEDORA-2015-77bfbc1bcd
- FEDORA-2015-14212
- FEDORA-2015-14212
- FEDORA-2015-14213
- FEDORA-2015-14213
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- DSA-3388
- DSA-3388
- 75589
- 75589
- 1034168
- 1034168
- https://bugzilla.redhat.com/show_bug.cgi?id=1238136
- https://bugzilla.redhat.com/show_bug.cgi?id=1238136
- GLSA-201509-01
- GLSA-201509-01
- https://security.netapp.com/advisory/ntap-20180731-0003/
- https://security.netapp.com/advisory/ntap-20180731-0003/
Modified: 2024-11-21
CVE-2015-5300
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc
- FEDORA-2015-f5f5ec7b6b
- FEDORA-2015-f5f5ec7b6b
- FEDORA-2015-77bfbc1bcd
- FEDORA-2015-77bfbc1bcd
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-34bc10a2c8
- SUSE-SU:2016:1175
- SUSE-SU:2016:1175
- SUSE-SU:2016:1177
- SUSE-SU:2016:1177
- SUSE-SU:2016:1247
- SUSE-SU:2016:1247
- openSUSE-SU:2016:1292
- openSUSE-SU:2016:1292
- SUSE-SU:2016:1311
- SUSE-SU:2016:1311
- SUSE-SU:2016:1912
- SUSE-SU:2016:1912
- SUSE-SU:2016:2094
- SUSE-SU:2016:2094
- openSUSE-SU:2016:1423
- openSUSE-SU:2016:1423
- RHSA-2015:1930
- RHSA-2015:1930
- [slackware-security] 20160223 ntp (SSA:2016-054-04)
- [slackware-security] 20160223 ntp (SSA:2016-054-04)
- http://support.ntp.org/bin/view/Main/NtpBug2956
- http://support.ntp.org/bin/view/Main/NtpBug2956
- http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit
- http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- 77312
- 77312
- 1034670
- 1034670
- USN-2783-1
- USN-2783-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://bugzilla.redhat.com/show_bug.cgi?id=1271076
- https://bugzilla.redhat.com/show_bug.cgi?id=1271076
- https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01
- https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://support.citrix.com/article/CTX220112
- https://support.citrix.com/article/CTX220112
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- FreeBSD-SA-16:02
- FreeBSD-SA-16:02
- https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428
- https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428
- https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073
- https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264
- https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264
- https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821
- https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821
- https://www-01.ibm.com/support/docview.wss?uid=swg21979393
- https://www-01.ibm.com/support/docview.wss?uid=swg21979393
- https://www-01.ibm.com/support/docview.wss?uid=swg21980676
- https://www-01.ibm.com/support/docview.wss?uid=swg21980676
- https://www-01.ibm.com/support/docview.wss?uid=swg21983501
- https://www-01.ibm.com/support/docview.wss?uid=swg21983501
- https://www-01.ibm.com/support/docview.wss?uid=swg21983506
- https://www-01.ibm.com/support/docview.wss?uid=swg21983506
Modified: 2024-11-21
CVE-2015-7691
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2899
- http://support.ntp.org/bin/view/Main/NtpBug2899
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77274
- 77274
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7692
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2899
- http://support.ntp.org/bin/view/Main/NtpBug2899
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77285
- 77285
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7701
Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2909
- http://support.ntp.org/bin/view/Main/NtpBug2909
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77281
- 77281
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7702
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2899
- http://support.ntp.org/bin/view/Main/NtpBug2899
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77286
- 77286
- 1033951
- 1033951
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7703
The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2902
- http://support.ntp.org/bin/view/Main/NtpBug2902
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77278
- 77278
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1254547
- https://bugzilla.redhat.com/show_bug.cgi?id=1254547
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7704
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
- http://bugs.ntp.org/show_bug.cgi?id=2901
- http://bugs.ntp.org/show_bug.cgi?id=2901
- RHSA-2015:1930
- RHSA-2015:1930
- RHSA-2015:2520
- RHSA-2015:2520
- http://support.ntp.org/bin/view/Main/NtpBug2901
- http://support.ntp.org/bin/view/Main/NtpBug2901
- http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
- http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 77280
- 77280
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1271070
- https://bugzilla.redhat.com/show_bug.cgi?id=1271070
- https://eprint.iacr.org/2015/1020.pdf
- https://eprint.iacr.org/2015/1020.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://support.citrix.com/article/CTX220112
- https://support.citrix.com/article/CTX220112
- https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
- https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7705
The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- SUSE-SU-2016:1278
- SUSE-SU-2016:1278
- SUSE-SU-2016:1291
- SUSE-SU-2016:1291
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- openSUSE-SU-2016:1329
- openSUSE-SU-2016:1329
- SUSE-SU-2016:1471
- SUSE-SU-2016:1471
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2015:2016
- openSUSE-SU-2015:2016
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug2901
- http://support.ntp.org/bin/view/Main/NtpBug2901
- http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
- http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
- 20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 77284
- 77284
- 1033951
- 1033951
- USN-2783-1
- USN-2783-1
- https://bto.bluecoat.com/security-advisory/sa103
- https://bto.bluecoat.com/security-advisory/sa103
- https://bugzilla.redhat.com/show_bug.cgi?id=1274184
- https://bugzilla.redhat.com/show_bug.cgi?id=1274184
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://eprint.iacr.org/2015/1020.pdf
- https://eprint.iacr.org/2015/1020.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://support.citrix.com/article/CTX220112
- https://support.citrix.com/article/CTX220112
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
- https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7849
Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
- http://support.ntp.org/bin/view/Main/NtpBug2916
- http://support.ntp.org/bin/view/Main/NtpBug2916
- 77276
- 77276
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274257
- https://bugzilla.redhat.com/show_bug.cgi?id=1274257
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7850
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
- http://support.ntp.org/bin/view/Main/NtpBug2917
- http://support.ntp.org/bin/view/Main/NtpBug2917
- DSA-3388
- DSA-3388
- 77279
- 77279
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274258
- https://bugzilla.redhat.com/show_bug.cgi?id=1274258
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7852
ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2919
- http://support.ntp.org/bin/view/Main/NtpBug2919
- DSA-3388
- DSA-3388
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 77288
- 77288
- 1033951
- 1033951
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7853
The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2015:2016
- openSUSE-SU-2015:2016
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html
- http://packetstormsecurity.com/files/134082/FreeBSD-Security-Advisory-ntp-Authentication-Bypass.html
- http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/134137/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug2920
- http://support.ntp.org/bin/view/Main/NtpBug2920
- 20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151021 Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp
- 20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]
- 20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151022 Cisco Security Advisory: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015
- 20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp
- 20151026 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151029 [slackware-security] ntp (SSA:2015-302-03)
- 20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]
- 20151104 FreeBSD Security Advisory FreeBSD-SA-15:25.ntp [REVISED]
- 77273
- 77273
- 1033951
- 1033951
- http://www.talosintel.com/vulnerability-reports/
- http://www.talosintel.com/vulnerability-reports/
- USN-2783-1
- USN-2783-1
- https://bto.bluecoat.com/security-advisory/sa103
- https://bto.bluecoat.com/security-advisory/sa103
- https://bugzilla.redhat.com/show_bug.cgi?id=1274262
- https://bugzilla.redhat.com/show_bug.cgi?id=1274262
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
Modified: 2024-11-21
CVE-2015-7854
Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
- http://support.ntp.org/bin/view/Main/NtpBug2921
- http://support.ntp.org/bin/view/Main/NtpBug2921
- 77277
- 77277
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274263
- https://bugzilla.redhat.com/show_bug.cgi?id=1274263
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
Modified: 2024-11-21
CVE-2015-7855
The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
- http://support.ntp.org/bin/view/Main/NtpBug2922
- http://support.ntp.org/bin/view/Main/NtpBug2922
- DSA-3388
- DSA-3388
- 77283
- 77283
- 1033951
- 1033951
- https://bugzilla.redhat.com/show_bug.cgi?id=1274264
- https://bugzilla.redhat.com/show_bug.cgi?id=1274264
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- 40840
- 40840
Modified: 2024-11-21
CVE-2015-7973
NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://support.ntp.org/bin/view/Main/NtpBug2935
- http://support.ntp.org/bin/view/Main/NtpBug2935
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 81963
- 81963
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7974
NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
- http://bugs.ntp.org/show_bug.cgi?id=2936
- http://bugs.ntp.org/show_bug.cgi?id=2936
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2936
- http://support.ntp.org/bin/view/Main/NtpBug2936
- DSA-3629
- DSA-3629
- 81960
- 81960
- 1034782
- 1034782
- http://www.talosintel.com/reports/TALOS-2016-0071/
- http://www.talosintel.com/reports/TALOS-2016-0071/
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
Modified: 2024-11-21
CVE-2015-7975
The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://support.ntp.org/bin/view/Main/NtpBug2937
- http://support.ntp.org/bin/view/Main/NtpBug2937
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 81959
- 81959
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7976
The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://support.ntp.org/bin/view/Main/NtpBug2938
- http://support.ntp.org/bin/view/Main/NtpBug2938
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7977
ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-8bb1932088
- FEDORA-2016-8bb1932088
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2939
- http://support.ntp.org/bin/view/Main/NtpBug2939
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 81815
- 81815
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7978
NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-8bb1932088
- FEDORA-2016-8bb1932088
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- RHSA-2016:0780
- RHSA-2016:0780
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 81962
- 81962
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-7979
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-8bb1932088
- FEDORA-2016-8bb1932088
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- RHSA-2016:1552
- RHSA-2016:1552
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 81816
- 81816
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- RHSA-2016:1141
- RHSA-2016:1141
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-8138
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-34bc10a2c8
- FEDORA-2016-8bb1932088
- FEDORA-2016-8bb1932088
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- RHSA-2016:0063
- RHSA-2016:0063
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016
- 20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 81811
- 81811
- 1034782
- 1034782
- USN-3096-1
- USN-3096-1
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- 20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016
- 20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
- https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-8139
ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://support.ntp.org/bin/view/Main/NtpBug2946
- http://support.ntp.org/bin/view/Main/NtpBug2946
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 82105
- 82105
- 1034782
- 1034782
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- FEDORA-2016-50b0066b7f
- FEDORA-2016-50b0066b7f
- FEDORA-2016-89e0874533
- FEDORA-2016-89e0874533
- FEDORA-2016-c3bd6a3496
- FEDORA-2016-c3bd6a3496
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20200204-0003/
- https://security.netapp.com/advisory/ntap-20200204-0003/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-8140
The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
- SUSE-SU-2016:1175
- SUSE-SU-2016:1175
- SUSE-SU-2016:1177
- SUSE-SU-2016:1177
- SUSE-SU-2016:1247
- SUSE-SU-2016:1247
- openSUSE-SU-2016:1292
- openSUSE-SU-2016:1292
- SUSE-SU-2016:1311
- SUSE-SU-2016:1311
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://support.ntp.org/bin/view/Main/NtpBug2947
- http://support.ntp.org/bin/view/Main/NtpBug2947
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016
- 1034782
- 1034782
- https://bto.bluecoat.com/security-advisory/sa113
- https://bto.bluecoat.com/security-advisory/sa113
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20200204-0003/
- https://security.netapp.com/advisory/ntap-20200204-0003/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2015-8158
The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
- RHSA-2016:2583
- RHSA-2016:2583
- http://support.ntp.org/bin/view/Main/NtpBug2948
- http://support.ntp.org/bin/view/Main/NtpBug2948
- DSA-3629
- DSA-3629
- 81814
- 81814
- 1034782
- 1034782
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us
- FreeBSD-SA-16:09
- FreeBSD-SA-16:09
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171031-0001/
- https://security.netapp.com/advisory/ntap-20171031-0001/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2016-1547
An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
- RHSA-2016:1552
- RHSA-2016:1552
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 88276
- 88276
- 1035705
- 1035705
- http://www.talosintelligence.com/reports/TALOS-2016-0081/
- http://www.talosintelligence.com/reports/TALOS-2016-0081/
- RHSA-2016:1141
- RHSA-2016:1141
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
- https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19
Modified: 2024-11-21
CVE-2016-2516
NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
- http://support.ntp.org/bin/view/Main/NtpBug3011
- http://support.ntp.org/bin/view/Main/NtpBug3011
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 88180
- 88180
- 1035705
- 1035705
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2016-2517
NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
- http://support.ntp.org/bin/view/Main/NtpBug3010
- http://support.ntp.org/bin/view/Main/NtpBug3010
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 88189
- 88189
- 1035705
- 1035705
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2016-2518
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
- FEDORA-2016-ed8c6c0426
- FEDORA-2016-ed8c6c0426
- FEDORA-2016-5b2eb0bf9c
- FEDORA-2016-5b2eb0bf9c
- SUSE-SU-2016:1278
- SUSE-SU-2016:1278
- SUSE-SU-2016:1291
- SUSE-SU-2016:1291
- openSUSE-SU-2016:1329
- openSUSE-SU-2016:1329
- SUSE-SU-2016:1471
- SUSE-SU-2016:1471
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- openSUSE-SU-2016:1423
- openSUSE-SU-2016:1423
- http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
- RHSA-2016:1552
- RHSA-2016:1552
- http://support.ntp.org/bin/view/Main/NtpBug3009
- http://support.ntp.org/bin/view/Main/NtpBug3009
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security
- 20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016
- 20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016
- DSA-3629
- DSA-3629
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 20160429 [slackware-security] ntp (SSA:2016-120-01)
- 20160429 [slackware-security] ntp (SSA:2016-120-01)
- 20160429 [slackware-security] ntp (SSA:2016-120-01)
- 20160429 [slackware-security] ntp (SSA:2016-120-01)
- 88226
- 88226
- 1035705
- 1035705
- USN-3096-1
- USN-3096-1
- RHSA-2016:1141
- RHSA-2016:1141
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://support.f5.com/csp/article/K20804323
- https://support.f5.com/csp/article/K20804323
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- DSA-3629
- DSA-3629
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2016-2519
ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
- http://support.ntp.org/bin/view/Main/NtpBug3008
- http://support.ntp.org/bin/view/Main/NtpBug3008
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 88204
- 88204
- 1035705
- 1035705
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- VU#718152
- VU#718152
Modified: 2024-11-21
CVE-2016-4953
ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
- http://bugs.ntp.org/3045
- http://bugs.ntp.org/3045
- SUSE-SU-2016:1563
- SUSE-SU-2016:1563
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- openSUSE-SU-2016:1583
- openSUSE-SU-2016:1583
- SUSE-SU-2016:1584
- SUSE-SU-2016:1584
- SUSE-SU-2016:1602
- SUSE-SU-2016:1602
- openSUSE-SU-2016:1636
- openSUSE-SU-2016:1636
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://support.ntp.org/bin/view/Main/NtpBug3045
- http://support.ntp.org/bin/view/Main/NtpBug3045
- http://support.ntp.org/bin/view/Main/SecurityNotice
- http://support.ntp.org/bin/view/Main/SecurityNotice
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- VU#321640
- VU#321640
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 91010
- 91010
- 1036037
- 1036037
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- FreeBSD-SA-16:24
- FreeBSD-SA-16:24
- GLSA-201607-15
- GLSA-201607-15
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- VU#321640
- VU#321640
Modified: 2024-11-21
CVE-2016-4954
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
- http://bugs.ntp.org/3044
- http://bugs.ntp.org/3044
- SUSE-SU-2016:1563
- SUSE-SU-2016:1563
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- openSUSE-SU-2016:1583
- openSUSE-SU-2016:1583
- SUSE-SU-2016:1584
- SUSE-SU-2016:1584
- SUSE-SU-2016:1602
- SUSE-SU-2016:1602
- openSUSE-SU-2016:1636
- openSUSE-SU-2016:1636
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://support.ntp.org/bin/view/Main/NtpBug3044
- http://support.ntp.org/bin/view/Main/NtpBug3044
- http://support.ntp.org/bin/view/Main/SecurityNotice
- http://support.ntp.org/bin/view/Main/SecurityNotice
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- VU#321640
- VU#321640
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 1036037
- 1036037
- USN-3096-1
- USN-3096-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- FEDORA-2016-50b0066b7f
- FEDORA-2016-50b0066b7f
- FEDORA-2016-89e0874533
- FEDORA-2016-89e0874533
- FEDORA-2016-c3bd6a3496
- FEDORA-2016-c3bd6a3496
- FreeBSD-SA-16:24
- FreeBSD-SA-16:24
- GLSA-201607-15
- GLSA-201607-15
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- VU#321640
- VU#321640
Modified: 2024-11-21
CVE-2016-4955
ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
- http://bugs.ntp.org/3043
- http://bugs.ntp.org/3043
- SUSE-SU-2016:1563
- SUSE-SU-2016:1563
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- openSUSE-SU-2016:1583
- openSUSE-SU-2016:1583
- SUSE-SU-2016:1584
- SUSE-SU-2016:1584
- SUSE-SU-2016:1602
- SUSE-SU-2016:1602
- openSUSE-SU-2016:1636
- openSUSE-SU-2016:1636
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://packetstormsecurity.com/files/137322/FreeBSD-Security-Advisory-FreeBSD-SA-16-24.ntp.html
- http://support.ntp.org/bin/view/Main/NtpBug3043
- http://support.ntp.org/bin/view/Main/NtpBug3043
- http://support.ntp.org/bin/view/Main/SecurityNotice
- http://support.ntp.org/bin/view/Main/SecurityNotice
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- VU#321640
- VU#321640
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 91007
- 91007
- 1036037
- 1036037
- USN-3096-1
- USN-3096-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- FEDORA-2016-50b0066b7f
- FEDORA-2016-50b0066b7f
- FEDORA-2016-89e0874533
- FEDORA-2016-89e0874533
- FEDORA-2016-c3bd6a3496
- FEDORA-2016-c3bd6a3496
- FreeBSD-SA-16:24
- FreeBSD-SA-16:24
- GLSA-201607-15
- GLSA-201607-15
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- VU#321640
- VU#321640
Modified: 2024-11-21
CVE-2016-4956
ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
- http://bugs.ntp.org/3042
- http://bugs.ntp.org/3042
- SUSE-SU-2016:1563
- SUSE-SU-2016:1563
- SUSE-SU-2016:1568
- SUSE-SU-2016:1568
- openSUSE-SU-2016:1583
- openSUSE-SU-2016:1583
- SUSE-SU-2016:1584
- SUSE-SU-2016:1584
- SUSE-SU-2016:1602
- SUSE-SU-2016:1602
- openSUSE-SU-2016:1636
- openSUSE-SU-2016:1636
- SUSE-SU-2016:1912
- SUSE-SU-2016:1912
- SUSE-SU-2016:2094
- SUSE-SU-2016:2094
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/137321/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3042
- http://support.ntp.org/bin/view/Main/NtpBug3042
- http://support.ntp.org/bin/view/Main/SecurityNotice
- http://support.ntp.org/bin/view/Main/SecurityNotice
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- 20160603 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: June 2016
- VU#321640
- VU#321640
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 [slackware-security] ntp (SSA:2016-155-01)
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20160604 FreeBSD Security Advisory FreeBSD-SA-16:24.ntp
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 20170607 [security bulletin] HPESBHF03757 rev.1 - HPE Network Products including Comware 5 and Comware 7 running NTP, Remote Denial of Service (DoS)
- 91009
- 91009
- 1036037
- 1036037
- USN-3096-1
- USN-3096-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03757en_us
- FEDORA-2016-50b0066b7f
- FEDORA-2016-50b0066b7f
- FEDORA-2016-89e0874533
- FEDORA-2016-89e0874533
- FEDORA-2016-c3bd6a3496
- FEDORA-2016-c3bd6a3496
- FreeBSD-SA-16:24
- FreeBSD-SA-16:24
- GLSA-201607-15
- GLSA-201607-15
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- VU#321640
- VU#321640
Modified: 2024-11-21
CVE-2016-7426
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- RHSA-2017:0252
- RHSA-2017:0252
- http://support.ntp.org/bin/view/Main/NtpBug3071
- http://support.ntp.org/bin/view/Main/NtpBug3071
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- 94451
- 94451
- 1037354
- 1037354
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- FreeBSD-SA-16:39
- FreeBSD-SA-16:39
- USN-3707-2
- USN-3707-2
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2016-7429
NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- RHSA-2017:0252
- RHSA-2017:0252
- http://support.ntp.org/bin/view/Main/NtpBug3072
- http://support.ntp.org/bin/view/Main/NtpBug3072
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 94453
- 94453
- 1037354
- 1037354
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2016-7433
NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
- openSUSE-SU-2016:3280
- openSUSE-SU-2016:3280
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- RHSA-2017:0252
- RHSA-2017:0252
- http://support.ntp.org/bin/view/Main/NtpBug3067
- http://support.ntp.org/bin/view/Main/NtpBug3067
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-ntpd-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171129-01-ntpd-en
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp
- 20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp
- 20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities
- 20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities
- 20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp
- 20161222 FreeBSD Security Advisory FreeBSD-SA-16:39.ntp
- 20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities
- 20170310 [security bulletin] HPESBUX03706 rev.1 - HP-UX NTP service running ntpd, Multiple Vulnerabilities
- 94455
- 94455
- 1037354
- 1037354
- USN-3349-1
- USN-3349-1
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- FEDORA-2016-c198d15316
- FEDORA-2016-c198d15316
- FEDORA-2016-e8a8561ee7
- FEDORA-2016-e8a8561ee7
- FEDORA-2016-7209ab4e02
- FEDORA-2016-7209ab4e02
- FreeBSD-SA-16:39
- FreeBSD-SA-16:39
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-227/
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2016-7434
The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- http://support.ntp.org/bin/view/Main/NtpBug3082
- http://support.ntp.org/bin/view/Main/NtpBug3082
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- 94448
- 94448
- 1037354
- 1037354
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- FreeBSD-SA-16:39
- FreeBSD-SA-16:39
- 40806
- 40806
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2016-9310
The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- RHSA-2017:0252
- RHSA-2017:0252
- http://support.ntp.org/bin/view/Main/NtpBug3118
- http://support.ntp.org/bin/view/Main/NtpBug3118
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- 94452
- 94452
- 1037354
- 1037354
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- FreeBSD-SA-16:39
- FreeBSD-SA-16:39
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
- USN-3707-2
- USN-3707-2
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2016-9311
ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
- http://nwtime.org/ntp428p9_release/
- http://nwtime.org/ntp428p9_release/
- RHSA-2017:0252
- RHSA-2017:0252
- http://support.ntp.org/bin/view/Main/NtpBug3119
- http://support.ntp.org/bin/view/Main/NtpBug3119
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- 94444
- 94444
- 1037354
- 1037354
- https://bto.bluecoat.com/security-advisory/sa139
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- FreeBSD-SA-16:39
- FreeBSD-SA-16:39
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03799en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03885en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03885en_us
- USN-3707-2
- USN-3707-2
- VU#633847
- VU#633847
Modified: 2024-11-21
CVE-2017-6451
The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.
- http://support.ntp.org/bin/view/Main/NtpBug3378
- http://support.ntp.org/bin/view/Main/NtpBug3378
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97058
- 97058
- 1038123
- 1038123
- 1039427
- 1039427
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
Modified: 2024-11-21
CVE-2017-6452
Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.
- http://support.ntp.org/bin/view/Main/NtpBug3383
- http://support.ntp.org/bin/view/Main/NtpBug3383
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97078
- 97078
- 1038123
- 1038123
- 1039427
- 1039427
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
Modified: 2024-11-21
CVE-2017-6455
NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows local users to gain privileges via a DLL in the PPSAPI_DLLS environment variable.
- http://support.ntp.org/bin/view/Main/NtpBug3384
- http://support.ntp.org/bin/view/Main/NtpBug3384
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97074
- 97074
- 1038123
- 1038123
- 1039427
- 1039427
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
Modified: 2024-11-21
CVE-2017-6458
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
- http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- 20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
- 20171101 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
- 20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
- 20170925 APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
- http://support.ntp.org/bin/view/Main/NtpBug3379
- http://support.ntp.org/bin/view/Main/NtpBug3379
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 20170422 [slackware-security] ntp (SSA:2017-112-02)
- 20170422 [slackware-security] ntp (SSA:2017-112-02)
- 97051
- 97051
- 1038123
- 1038123
- USN-3349-1
- USN-3349-1
- https://bto.bluecoat.com/security-advisory/sa147
- https://bto.bluecoat.com/security-advisory/sa147
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- FEDORA-2017-5ebac1c112
- FEDORA-2017-5ebac1c112
- FEDORA-2017-20d54b2782
- FEDORA-2017-20d54b2782
- FEDORA-2017-72323a442f
- FEDORA-2017-72323a442f
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.apple.com/kb/HT208144
- https://support.apple.com/kb/HT208144
- https://support.f5.com/csp/article/K99254031
- https://support.f5.com/csp/article/K99254031
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
Modified: 2024-11-21
CVE-2017-6459
The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via vectors related to an argument with multiple null bytes.
- http://support.ntp.org/bin/view/Main/NtpBug3382
- http://support.ntp.org/bin/view/Main/NtpBug3382
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97076
- 97076
- 1038123
- 1038123
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
Modified: 2024-11-21
CVE-2017-6460
Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
- http://support.ntp.org/bin/view/Main/NtpBug3377
- http://support.ntp.org/bin/view/Main/NtpBug3377
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97052
- 97052
- 1038123
- 1038123
- https://security.paloaltonetworks.com/CVE-2017-6460
- https://security.paloaltonetworks.com/CVE-2017-6460
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
Modified: 2024-11-21
CVE-2017-6462
Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
- http://support.ntp.org/bin/view/Main/NtpBug3388
- http://support.ntp.org/bin/view/Main/NtpBug3388
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97045
- 97045
- 1038123
- 1038123
- RHSA-2017:3071
- RHSA-2017:3071
- RHSA-2018:0855
- RHSA-2018:0855
- FreeBSD-SA-17:03
- FreeBSD-SA-17:03
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-2
- USN-3707-2
Modified: 2024-11-21
CVE-2017-6463
NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
- http://support.ntp.org/bin/view/Main/NtpBug3387
- http://support.ntp.org/bin/view/Main/NtpBug3387
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97049
- 97049
- 1038123
- 1038123
- RHSA-2017:3071
- RHSA-2017:3071
- RHSA-2018:0855
- RHSA-2018:0855
- FreeBSD-SA-17:03
- FreeBSD-SA-17:03
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-2
- USN-3707-2
Modified: 2024-11-21
CVE-2017-6464
NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
- http://support.ntp.org/bin/view/Main/NtpBug3389
- http://support.ntp.org/bin/view/Main/NtpBug3389
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- 97050
- 97050
- 1038123
- 1038123
- RHSA-2017:3071
- RHSA-2017:3071
- RHSA-2018:0855
- RHSA-2018:0855
- FreeBSD-SA-17:03
- FreeBSD-SA-17:03
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
Modified: 2025-01-14
CVE-2018-7170
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3415
- http://support.ntp.org/bin/view/Main/NtpBug3415
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 103194
- 103194
- https://bugzilla.redhat.com/show_bug.cgi?id=1550214
- https://bugzilla.redhat.com/show_bug.cgi?id=1550214
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Closed vulnerabilities
BDU:2017-00232
Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00233
Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00239
Уязвимость компонента Server: DML системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00240
Уязвимость компонента Server: Charsets системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00243
Уязвимость компонента Server: Optimizer системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01119
Уязвимость системы управления базами данных Oracle MySQL, позволяющая нарушителю модифицировать данные
BDU:2017-01127
Уязвимость системы управления базами данных Oracle MySQL, позволяющая нарушителю получить привилегированный доступ и вызвать отказ в обслуживании
BDU:2017-01130
Уязвимость системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01155
Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01156
Уязвимость системы управления базами данных MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00676
Уязвимость компонента Server:InnoDB системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00678
Уязвимость компонента Client programs системы управления базами данных Oracle MySQL, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00679
Уязвимость компонента Server:DDL системы управления базами данных Oracle MySQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-6664
mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
- http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
- http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html
- http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
- http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html
- RHSA-2016:2130
- RHSA-2016:2130
- RHSA-2016:2749
- RHSA-2016:2749
- 20161101 MySQL / MariaDB / PerconaDB - Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]
- 20161101 MySQL / MariaDB / PerconaDB - Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- 20161104 MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )
- 20161104 MySQL / MariaDB / PerconaDB - Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )
- 93612
- 93612
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-18
- GLSA-201702-18
- 40679
- 40679
- https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
- https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
Modified: 2024-11-21
CVE-2017-10286
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 101397
- 101397
- 1039597
- 1039597
- RHSA-2017:3265
- RHSA-2017:3265
- RHSA-2017:3442
- RHSA-2017:3442
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- https://security.netapp.com/advisory/ntap-20171019-0002/
- https://security.netapp.com/advisory/ntap-20171019-0002/
Modified: 2024-11-21
CVE-2017-10379
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
- DSA-4002
- DSA-4002
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 101415
- 101415
- 1039597
- 1039597
- RHSA-2017:3265
- RHSA-2017:3265
- RHSA-2017:3442
- RHSA-2017:3442
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- RHSA-2018:2439
- RHSA-2018:2439
- RHSA-2018:2729
- RHSA-2018:2729
- https://security.netapp.com/advisory/ntap-20171019-0002/
- https://security.netapp.com/advisory/ntap-20171019-0002/
Modified: 2024-11-21
CVE-2017-10384
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
- DSA-4002
- DSA-4002
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 101406
- 101406
- 1039597
- 1039597
- RHSA-2017:3265
- RHSA-2017:3265
- RHSA-2017:3442
- RHSA-2017:3442
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- RHSA-2018:2439
- RHSA-2018:2439
- RHSA-2018:2729
- RHSA-2018:2729
- https://security.netapp.com/advisory/ntap-20171019-0002/
- https://security.netapp.com/advisory/ntap-20171019-0002/
Modified: 2024-11-21
CVE-2017-3238
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95571
- 95571
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3243
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95538
- 95538
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3244
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95565
- 95565
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3257
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95589
- 95589
- 1037640
- 1037640
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3258
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95560
- 95560
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3265
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95520
- 95520
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3291
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95501
- 95501
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3302
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
- DSA-3809
- DSA-3809
- DSA-3834
- DSA-3834
- http://www.openwall.com/lists/oss-security/2017/02/11/11
- http://www.openwall.com/lists/oss-security/2017/02/11/11
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 96162
- 96162
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3308
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
- DSA-3834
- DSA-3834
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 97725
- 97725
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3309
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
- DSA-3834
- DSA-3834
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 97742
- 97742
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3312
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95491
- 95491
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3313
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
- DSA-3767
- DSA-3767
- DSA-3809
- DSA-3809
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95527
- 95527
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
Modified: 2024-11-21
CVE-2017-3317
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95585
- 95585
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3318
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
- DSA-3767
- DSA-3767
- DSA-3770
- DSA-3770
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- 95588
- 95588
- 1037640
- 1037640
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- GLSA-201702-17
- GLSA-201702-17
- GLSA-201702-18
- GLSA-201702-18
Modified: 2024-11-21
CVE-2017-3453
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
- DSA-3834
- DSA-3834
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 97776
- 97776
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3456
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- DSA-3834
- DSA-3834
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 97831
- 97831
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3464
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
- DSA-3834
- DSA-3834
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- 97818
- 97818
- 1038287
- 1038287
- RHSA-2017:2192
- RHSA-2017:2192
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
Modified: 2024-11-21
CVE-2017-3636
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
- DSA-3922
- DSA-3922
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- 99736
- 99736
- 1038928
- 1038928
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- RHSA-2018:2439
- RHSA-2018:2439
- RHSA-2018:2729
- RHSA-2018:2729
- DSA-3955
- DSA-3955
Modified: 2024-11-21
CVE-2017-3641
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- DSA-3922
- DSA-3922
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- 99767
- 99767
- 1038928
- 1038928
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- RHSA-2018:2439
- RHSA-2018:2439
- RHSA-2018:2729
- RHSA-2018:2729
- DSA-3955
- DSA-3955
Modified: 2024-11-21
CVE-2017-3653
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
- DSA-3922
- DSA-3922
- DSA-3944
- DSA-3944
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- 99810
- 99810
- 1038928
- 1038928
- RHSA-2017:2787
- RHSA-2017:2787
- RHSA-2017:2886
- RHSA-2017:2886
- RHSA-2018:0279
- RHSA-2018:0279
- RHSA-2018:0574
- RHSA-2018:0574
- RHSA-2018:2439
- RHSA-2018:2439
- RHSA-2018:2729
- RHSA-2018:2729
- DSA-3955
- DSA-3955
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-8649
lxc-attach in LXC before 1.0.9 and 2.x before 2.0.6 allows an attacker inside of an unprivileged container to use an inherited file descriptor, of the host's /proc, to access the rest of the host's filesystem via the openat() family of syscalls.
- 94498
- 94498
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845465
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1639345
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://bugzilla.redhat.com/show_bug.cgi?id=1398242
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://github.com/lxc/lxc/commit/81f466d05f2a89cb4f122ef7f593ff3f279b165c
- https://security-tracker.debian.org/tracker/CVE-2016-8649
- https://security-tracker.debian.org/tracker/CVE-2016-8649
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-3062
The mov_read_dref function in libavformat/mov.c in Libav before 11.7 and FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via the entries value in a dref box in an MP4 file.
- openSUSE-SU-2016:1685
- openSUSE-SU-2016:1685
- DSA-3603
- DSA-3603
- https://bugzilla.libav.org/show_bug.cgi?id=929
- https://bugzilla.libav.org/show_bug.cgi?id=929
- https://ffmpeg.org/security.html
- https://ffmpeg.org/security.html
- https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328
- https://git.libav.org/?p=libav.git%3Ba=commit%3Bh=7e01d48cfd168c3dfc663f03a3b6a98e0ecba328
- https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
- https://github.com/FFmpeg/FFmpeg/commit/689e59b7ffed34eba6159dcc78e87133862e3746
- https://libav.org/releases/libav-11.7.changelog
- https://libav.org/releases/libav-11.7.changelog
- GLSA-201705-08
- GLSA-201705-08
Closed vulnerabilities
BDU:2021-05819
Уязвимость сервера динамического назначения RPC-портов RPCbind, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-8779
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
- http://openwall.com/lists/oss-security/2017/05/03/12
- http://openwall.com/lists/oss-security/2017/05/03/12
- http://openwall.com/lists/oss-security/2017/05/04/1
- http://openwall.com/lists/oss-security/2017/05/04/1
- DSA-3845
- DSA-3845
- 98325
- 98325
- 1038532
- 1038532
- RHBA-2017:1497
- RHBA-2017:1497
- RHSA-2017:1262
- RHSA-2017:1262
- RHSA-2017:1263
- RHSA-2017:1263
- RHSA-2017:1267
- RHSA-2017:1267
- RHSA-2017:1268
- RHSA-2017:1268
- RHSA-2017:1395
- RHSA-2017:1395
- https://github.com/drbothen/GO-RPCBOMB
- https://github.com/drbothen/GO-RPCBOMB
- https://github.com/guidovranken/rpcbomb/
- https://github.com/guidovranken/rpcbomb/
- https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/
- https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/
- GLSA-201706-07
- GLSA-201706-07
- https://security.netapp.com/advisory/ntap-20180109-0001/
- https://security.netapp.com/advisory/ntap-20180109-0001/
- USN-3759-1
- USN-3759-1
- USN-3759-2
- USN-3759-2
- 41974
- 41974
Modified: 2024-11-21
CVE-2018-14621
An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted.
- http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=fce98161d9815ea016855d9f00274276452c2c4b
- https://bugzilla.novell.com/show_bug.cgi?id=968175
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14621
- http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=fce98161d9815ea016855d9f00274276452c2c4b
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14621
- https://bugzilla.novell.com/show_bug.cgi?id=968175
Closed vulnerabilities
BDU:2015-06338
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06339
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06340
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06344
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06345
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08609
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08610
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08611
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08612
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09010
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09718
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2016-00538
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00539
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00540
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-01124
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02189
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02190
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02191
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-02192
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00327
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00328
Уязвимость операционной системы openSUSE, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-00329
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-00330
Уязвимость библиотеки LibTIFF, позволяющая нарушителю получить несанкционированный доступ к устройству
BDU:2017-00883
Уязвимость библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2012-4564
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
- openSUSE-SU-2013:0187
- openSUSE-SU-2013:0187
- RHSA-2012:1590
- RHSA-2012:1590
- 51133
- 51133
- DSA-2575
- DSA-2575
- [oss-security] 20121102 libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
- [oss-security] 20121102 libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
- [oss-security] 20121102 Re: libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
- [oss-security] 20121102 Re: libtiff: Missing return value check in ppm2tiff leading to heap-buffer overflow when reading a tiff file
- 86878
- 86878
- 56372
- 56372
- USN-1631-1
- USN-1631-1
- https://bugzilla.redhat.com/show_bug.cgi?id=871700
- https://bugzilla.redhat.com/show_bug.cgi?id=871700
- libtiff-ppm2tiff-bo(79750)
- libtiff-ppm2tiff-bo(79750)
Modified: 2024-11-21
CVE-2013-1960
Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
- FEDORA-2013-7339
- FEDORA-2013-7339
- FEDORA-2013-7369
- FEDORA-2013-7369
- FEDORA-2013-7361
- FEDORA-2013-7361
- openSUSE-SU-2013:0922
- openSUSE-SU-2013:0922
- openSUSE-SU-2013:0944
- openSUSE-SU-2013:0944
- RHSA-2014:0223
- RHSA-2014:0223
- [oss-security] 20130502 Fwd: Two libtiff (tiff2pdf flaws)
- [oss-security] 20130502 Fwd: Two libtiff (tiff2pdf flaws)
- 53237
- 53237
- 53765
- 53765
- DSA-2698
- DSA-2698
- 59609
- 59609
- https://bugzilla.redhat.com/show_bug.cgi?id=952158
- https://bugzilla.redhat.com/show_bug.cgi?id=952158
Modified: 2024-11-21
CVE-2013-1961
Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
- FEDORA-2013-7339
- FEDORA-2013-7339
- FEDORA-2013-7369
- FEDORA-2013-7369
- FEDORA-2013-7361
- FEDORA-2013-7361
- openSUSE-SU-2013:0922
- openSUSE-SU-2013:0922
- openSUSE-SU-2013:0944
- openSUSE-SU-2013:0944
- RHSA-2014:0223
- RHSA-2014:0223
- [oss-security] 20130502 Fwd: Two libtiff (tiff2pdf flaws)
- [oss-security] 20130502 Fwd: Two libtiff (tiff2pdf flaws)
- 53237
- 53237
- 53765
- 53765
- DSA-2698
- DSA-2698
- 59607
- 59607
- https://bugzilla.redhat.com/show_bug.cgi?id=952131
- https://bugzilla.redhat.com/show_bug.cgi?id=952131
Modified: 2024-11-21
CVE-2013-4232
Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2449
- http://bugzilla.maptools.org/show_bug.cgi?id=2449
- RHSA-2014:0223
- RHSA-2014:0223
- 54543
- 54543
- 54628
- 54628
- [tiff] 20130801 Vulnerabilities in libtiff 4.0.3
- [tiff] 20130801 Vulnerabilities in libtiff 4.0.3
- DSA-2744
- DSA-2744
- [oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro
- [oss-security] 20130809 Re: CVE Request -- Four (stack-based) buffer overflows and one use-after-free in libtiff v4.0.3 reported by Pedro Ribeiro
- https://bugzilla.redhat.com/show_bug.cgi?id=995975
- https://bugzilla.redhat.com/show_bug.cgi?id=995975
Modified: 2024-11-21
CVE-2013-4243
Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2451
- http://bugzilla.maptools.org/show_bug.cgi?id=2451
- RHSA-2014:0223
- RHSA-2014:0223
- 54543
- 54543
- 54628
- 54628
- DSA-2744
- DSA-2744
- 62082
- 62082
- https://bugzilla.redhat.com/show_bug.cgi?id=996052
- https://bugzilla.redhat.com/show_bug.cgi?id=996052
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2013-4244
The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2452
- http://bugzilla.maptools.org/show_bug.cgi?id=2452
- RHSA-2014:0223
- RHSA-2014:0223
- https://bugzilla.redhat.com/show_bug.cgi?id=996468
- https://bugzilla.redhat.com/show_bug.cgi?id=996468
- https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
- https://github.com/vadz/libtiff/commit/ce6841d9e41d621ba23cf18b190ee6a23b2cc833
Modified: 2024-11-21
CVE-2014-8127
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
- http://bugzilla.maptools.org/show_bug.cgi?id=2484
- http://bugzilla.maptools.org/show_bug.cgi?id=2484
- http://bugzilla.maptools.org/show_bug.cgi?id=2485
- http://bugzilla.maptools.org/show_bug.cgi?id=2485
- http://bugzilla.maptools.org/show_bug.cgi?id=2486
- http://bugzilla.maptools.org/show_bug.cgi?id=2486
- http://bugzilla.maptools.org/show_bug.cgi?id=2496
- http://bugzilla.maptools.org/show_bug.cgi?id=2496
- http://bugzilla.maptools.org/show_bug.cgi?id=2497
- http://bugzilla.maptools.org/show_bug.cgi?id=2497
- http://bugzilla.maptools.org/show_bug.cgi?id=2500
- http://bugzilla.maptools.org/show_bug.cgi?id=2500
- openSUSE-SU-2015:0450
- openSUSE-SU-2015:0450
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- http://www.conostix.com/pub/adv/CVE-2014-8127-LibTIFF-Out-of-bounds_Reads.txt
- http://www.conostix.com/pub/adv/CVE-2014-8127-LibTIFF-Out-of-bounds_Reads.txt
- DSA-3273
- DSA-3273
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- 72323
- 72323
- 1032760
- 1032760
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2014-8129
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
- http://bugzilla.maptools.org/show_bug.cgi?id=2487
- http://bugzilla.maptools.org/show_bug.cgi?id=2487
- http://bugzilla.maptools.org/show_bug.cgi?id=2488
- http://bugzilla.maptools.org/show_bug.cgi?id=2488
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- http://www.conostix.com/pub/adv/CVE-2014-8129-LibTIFF-Out-of-bounds_Reads_and_Writes.txt
- http://www.conostix.com/pub/adv/CVE-2014-8129-LibTIFF-Out-of-bounds_Reads_and_Writes.txt
- 72352
- 72352
- 1032760
- 1032760
- https://bugzilla.redhat.com/show_bug.cgi?id=1185815
- https://bugzilla.redhat.com/show_bug.cgi?id=1185815
- GLSA-201701-16
- GLSA-201701-16
- DSA-3273
- DSA-3273
Modified: 2024-11-21
CVE-2014-8130
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
- http://bugzilla.maptools.org/show_bug.cgi?id=2483
- http://bugzilla.maptools.org/show_bug.cgi?id=2483
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
- http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
- 72353
- 72353
- 1032760
- 1032760
- https://bugzilla.redhat.com/show_bug.cgi?id=1185817
- https://bugzilla.redhat.com/show_bug.cgi?id=1185817
- https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
- https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2014-9330
Integer overflow in tif_packbits.c in bmp2tif in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) via crafted BMP image, related to dimensions, which triggers an out-of-bounds read.
- http://bugzilla.maptools.org/show_bug.cgi?id=2494
- http://bugzilla.maptools.org/show_bug.cgi?id=2494
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- 20141222 CVE-2014-9330: Libtiff integer overflow in bmp2tiff
- 20141222 CVE-2014-9330: Libtiff integer overflow in bmp2tiff
- DSA-3273
- DSA-3273
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 71789
- 71789
- 1031442
- 1031442
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2014-9655
The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
- [oss-security] 20150207 Re: Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150207 Re: Multiple vulnerabilities in LibTIFF and associated tools
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3273
- DSA-3273
- DSA-3467
- DSA-3467
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-1547
The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150124 Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150207 Re: Multiple vulnerabilities in LibTIFF and associated tools
- [oss-security] 20150207 Re: Multiple vulnerabilities in LibTIFF and associated tools
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3467
- DSA-3467
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 73438
- 73438
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-8781
tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
- http://bugzilla.maptools.org/show_bug.cgi?id=2522#c0
- http://bugzilla.maptools.org/show_bug.cgi?id=2522#c0
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0414
- openSUSE-SU-2016:0414
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3467
- DSA-3467
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 81730
- 81730
- USN-2939-1
- USN-2939-1
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-8782
tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
- http://bugzilla.maptools.org/show_bug.cgi?id=2522
- http://bugzilla.maptools.org/show_bug.cgi?id=2522
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0414
- openSUSE-SU-2016:0414
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3467
- DSA-3467
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 81730
- 81730
- USN-2939-1
- USN-2939-1
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-8783
tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2522
- http://bugzilla.maptools.org/show_bug.cgi?id=2522
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0405
- openSUSE-SU-2016:0414
- openSUSE-SU-2016:0414
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3467
- DSA-3467
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- [oss-security] 20160124 Re: CVE Request: tiff: Out-of-bounds write for invalid images using LogL compression
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 81730
- 81730
- USN-2939-1
- USN-2939-1
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-8784
The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image, as demonstrated by libtiff5.tif.
- http://bugzilla.maptools.org/show_bug.cgi?id=2508
- http://bugzilla.maptools.org/show_bug.cgi?id=2508
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3467
- DSA-3467
- [oss-security] 20160124 CVE Request: tiff: potential out-of-bound write in NeXTDecode()
- [oss-security] 20160124 CVE Request: tiff: potential out-of-bound write in NeXTDecode()
- [oss-security] 20160124 Re: CVE Request: tiff: potential out-of-bound write in NeXTDecode()
- [oss-security] 20160124 Re: CVE Request: tiff: potential out-of-bound write in NeXTDecode()
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 81696
- 81696
- USN-2939-1
- USN-2939-1
- https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c
- https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2015-8870
Integer overflow in tools/bmp2tiff.c in LibTIFF before 4.0.4 allows remote attackers to cause a denial of service (heap-based buffer over-read), or possibly obtain sensitive information from process memory, via crafted width and length values in RLE4 or RLE8 data in a BMP file.
Modified: 2024-11-21
CVE-2016-3620
The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c zip" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2570
- http://bugzilla.maptools.org/show_bug.cgi?id=2570
- [oss-security] 20160407 CVE-2016-3620 libtiff: Out-of-bounds Read in the bmp2tiff tool
- [oss-security] 20160407 CVE-2016-3620 libtiff: Out-of-bounds Read in the bmp2tiff tool
- 1035508
- 1035508
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3621
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4.0.6 and earlier, when the "-c lzw" option is used, allows remote attackers to cause a denial of service (buffer over-read) via a crafted BMP image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2565
- http://bugzilla.maptools.org/show_bug.cgi?id=2565
- [oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool
- [oss-security] 20160407 CVE-2016-3621 libtiff: Out-of-bounds Read in the bmp2tiff tool
- 1035508
- 1035508
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3623
The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
- http://bugzilla.maptools.org/show_bug.cgi?id=2569
- http://bugzilla.maptools.org/show_bug.cgi?id=2569
- openSUSE-SU-2016:2275
- openSUSE-SU-2016:2275
- DSA-3762
- DSA-3762
- [oss-security] 20160408 CVE-2016-3623 libtiff: Divide By Zero in the rgb2ycbcr tool
- [oss-security] 20160408 CVE-2016-3623 libtiff: Divide By Zero in the rgb2ycbcr tool
- 85952
- 85952
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3624
The cvtClump function in the rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) by setting the "-v" option to -1.
- http://bugzilla.maptools.org/show_bug.cgi?id=2568
- http://bugzilla.maptools.org/show_bug.cgi?id=2568
- DSA-3762
- DSA-3762
- [oss-security] 20160408 CVE-2016-3624 libtiff: Out-of-bounds Write in the rgb2ycbcr tool
- [oss-security] 20160408 CVE-2016-3624 libtiff: Out-of-bounds Write in the rgb2ycbcr tool
- 85956
- 85956
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3625
tif_read.c in the tiff2bw tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2566
- http://bugzilla.maptools.org/show_bug.cgi?id=2566
- [oss-security] 20160408 CVE-2016-3625 libtiff: Out-of-bounds Read in the tiff2bw tool
- [oss-security] 20160408 CVE-2016-3625 libtiff: Out-of-bounds Read in the tiff2bw tool
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3631
The (1) cpStrips and (2) cpTiles functions in the thumbnail tool in LibTIFF 4.0.6 and earlier allow remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the bytecounts[] array variable.
Modified: 2024-11-21
CVE-2016-3632
The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image.
- http://bugzilla.maptools.org/show_bug.cgi?id=2549
- http://bugzilla.maptools.org/show_bug.cgi?id=2549
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- [oss-security] 20160408 CVE-2016-3632 - libtiff 4.0.6 illegel write
- [oss-security] 20160408 CVE-2016-3632 - libtiff 4.0.6 illegel write
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 85953
- 85953
- 85960
- 85960
- https://bugzilla.redhat.com/show_bug.cgi?id=1325095
- https://bugzilla.redhat.com/show_bug.cgi?id=1325095
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3633
The setrow function in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the src variable.
Modified: 2024-11-21
CVE-2016-3634
The tagCompare function in tif_dirinfo.c in the thumbnail tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to field_tag matching.
Modified: 2024-11-21
CVE-2016-3658
The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
Modified: 2024-11-21
CVE-2016-3945
Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
- http://bugzilla.maptools.org/show_bug.cgi?id=2545
- http://bugzilla.maptools.org/show_bug.cgi?id=2545
- openSUSE-SU-2016:2275
- openSUSE-SU-2016:2275
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3762
- DSA-3762
- [oss-security] 20160408 CVE-2016-3945 libtiff: Out-of-bounds Write in the tiff2rgba tool
- [oss-security] 20160408 CVE-2016-3945 libtiff: Out-of-bounds Write in the tiff2rgba tool
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 85960
- 85960
- https://bugzilla.redhat.com/show_bug.cgi?id=1325093
- https://bugzilla.redhat.com/show_bug.cgi?id=1325093
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3990
Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
- http://bugzilla.maptools.org/show_bug.cgi?id=2544
- http://bugzilla.maptools.org/show_bug.cgi?id=2544
- openSUSE-SU-2016:2275
- openSUSE-SU-2016:2275
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3762
- DSA-3762
- [oss-security] 20160412 CVE-2016-3990 : out-of-bounds write in horizontalDifference8() in tiffcp tool
- [oss-security] 20160412 CVE-2016-3990 : out-of-bounds write in horizontalDifference8() in tiffcp tool
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 86000
- 86000
- https://bugzilla.redhat.com/show_bug.cgi?id=1326246
- https://bugzilla.redhat.com/show_bug.cgi?id=1326246
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-3991
Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
- http://bugzilla.maptools.org/show_bug.cgi?id=2543
- http://bugzilla.maptools.org/show_bug.cgi?id=2543
- openSUSE-SU-2016:2275
- openSUSE-SU-2016:2275
- RHSA-2016:1546
- RHSA-2016:1546
- RHSA-2016:1547
- RHSA-2016:1547
- DSA-3762
- DSA-3762
- [oss-security] 20160412 CVE-2016-3991 : out-of-bounds write in loadImage() in tiffcrop tool
- [oss-security] 20160412 CVE-2016-3991 : out-of-bounds write in loadImage() in tiffcrop tool
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 85996
- 85996
- https://bugzilla.redhat.com/show_bug.cgi?id=1326249
- https://bugzilla.redhat.com/show_bug.cgi?id=1326249
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-5102
Buffer overflow in the readgifimage function in gif2tiff.c in the gif2tiff tool in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (segmentation fault) via a crafted gif file.
Modified: 2024-11-21
CVE-2016-5314
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
- http://bugzilla.maptools.org/show_bug.cgi?id=2554
- http://bugzilla.maptools.org/show_bug.cgi?id=2554
- openSUSE-SU-2016:3035
- openSUSE-SU-2016:3035
- openSUSE-SU-2016:1889
- openSUSE-SU-2016:1889
- openSUSE-SU-2016:2321
- openSUSE-SU-2016:2321
- openSUSE-SU-2016:2375
- openSUSE-SU-2016:2375
- [oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes
- [oss-security] 20160615 CVE-2016-5314: libtiff 4.0.6 PixarLogDecode() out-of-bound writes
- [oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution
- [oss-security] 20160615 CVE-2016-5320: libtiff 4.0.6 rgb2ycbcr: command excution
- [oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format
- [oss-security] 20160630 Re: Re: CVE request: Heap-based buffer overflow in LibTIFF when using the PixarLog compression format
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 91195
- 91195
- 91245
- 91245
- https://bugzilla.redhat.com/show_bug.cgi?id=1346687
- https://bugzilla.redhat.com/show_bug.cgi?id=1346687
- https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2
- https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2
- GLSA-201701-16
- GLSA-201701-16
- DSA-3762
- DSA-3762
Modified: 2024-11-21
CVE-2016-5315
The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
- DSA-3762
- DSA-3762
- [oss-security] 20160615 CVE-2016-5315: libtiff 4.0.6 tif_dir.c: setByteArray() Read access violation
- [oss-security] 20160615 CVE-2016-5315: libtiff 4.0.6 tif_dir.c: setByteArray() Read access violation
- 91204
- 91204
- https://bugzilla.redhat.com/show_bug.cgi?id=1346694
- https://bugzilla.redhat.com/show_bug.cgi?id=1346694
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-5316
Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
- openSUSE-SU-2016:1889
- openSUSE-SU-2016:1889
- openSUSE-SU-2016:2321
- openSUSE-SU-2016:2321
- openSUSE-SU-2016:2375
- openSUSE-SU-2016:2375
- DSA-3762
- DSA-3762
- [oss-security] 20160615 CVE-2016-5316: libtiff 4.0.6 tif_pixarlog.c: PixarLogCleanup() Segmentation fault
- [oss-security] 20160615 CVE-2016-5316: libtiff 4.0.6 tif_pixarlog.c: PixarLogCleanup() Segmentation fault
- 91203
- 91203
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-5318
Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
- [oss-security] 20160427 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160427 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160606 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160606 3 bugs refer to buffer overflow in in libtiff 4.0.6
- 88604
- 88604
- GLSA-201701-16
- GLSA-201701-16
- USN-3606-1
- USN-3606-1
Modified: 2024-11-21
CVE-2016-5319
Heap-based buffer overflow in tif_packbits.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted bmp file.
- [oss-security] 20160427 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160427 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160606 3 bugs refer to buffer overflow in in libtiff 4.0.6
- [oss-security] 20160606 3 bugs refer to buffer overflow in in libtiff 4.0.6
- 88604
- 88604
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-5321
The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
Modified: 2024-11-21
CVE-2016-5322
The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
- DSA-3762
- DSA-3762
- [oss-security] 20160615 CVE-2016-5315: libtiff 4.0.6 tif_dir.c: setByteArray() Read access violation
- [oss-security] 20160615 CVE-2016-5315: libtiff 4.0.6 tif_dir.c: setByteArray() Read access violation
- 91204
- 91204
- 91205
- 91205
- https://bugzilla.redhat.com/show_bug.cgi?id=1346694
- https://bugzilla.redhat.com/show_bug.cgi?id=1346694
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-5323
The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
Modified: 2024-11-21
CVE-2016-6223
The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in libtiff before 4.0.7 allows remote attackers to cause a denial of service (crash) or possibly obtain sensitive information via a negative index in a file-content buffer.
- http://libtiff.maptools.org/v4.0.7.html
- http://libtiff.maptools.org/v4.0.7.html
- DSA-3762
- DSA-3762
- [oss-security] 20160713 CVE request: Information leak in LibTIFF
- [oss-security] 20160713 CVE request: Information leak in LibTIFF
- [oss-security] 20160714 Re: CVE request: Information leak in LibTIFF
- [oss-security] 20160714 Re: CVE request: Information leak in LibTIFF
- 91741
- 91741
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-9453
The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
- http://bugzilla.maptools.org/show_bug.cgi?id=2579
- http://bugzilla.maptools.org/show_bug.cgi?id=2579
- openSUSE-SU-2016:3035
- openSUSE-SU-2016:3035
- DSA-3762
- DSA-3762
- [oss-security] 20161118 Re: CVE Request: libtiff: Out-of-bounds Write memcpy and less bound check in tiff2pdf
- [oss-security] 20161118 Re: CVE Request: libtiff: Out-of-bounds Write memcpy and less bound check in tiff2pdf
- 94406
- 94406
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2016-9532
Integer overflow in the writeBufferToSeparateStrips function in tiffcrop.c in LibTIFF before 4.0.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tif file.
- http://bugzilla.maptools.org/show_bug.cgi?id=2592
- http://bugzilla.maptools.org/show_bug.cgi?id=2592
- DSA-3762
- DSA-3762
- [oss-security] 20161111 CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- [oss-security] 20161111 CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- [oss-security] 20161121 Re: CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- [oss-security] 20161121 Re: CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- [oss-security] 20161121 Re: CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- [oss-security] 20161121 Re: CVE request: LibTIFF tiffcrop: Heap buffer overflow via writeBufferToSeparateStrips
- 94424
- 94424
- https://bugzilla.redhat.com/show_bug.cgi?id=1397726
- https://bugzilla.redhat.com/show_bug.cgi?id=1397726
- GLSA-201701-16
- GLSA-201701-16
Modified: 2024-11-21
CVE-2018-5360
LibTIFF before 4.0.6 mishandles the reading of TIFF files, as demonstrated by a heap-based buffer over-read in the ReadTIFFImage function in coders/tiff.c in GraphicsMagick 1.3.27.
- http://bugzilla.maptools.org/show_bug.cgi?id=2500
- http://bugzilla.maptools.org/show_bug.cgi?id=2500
- https://gitlab.com/libtiff/libtiff/commit/739dcd28a061738b317c1e9f91029d9cbc157159
- https://gitlab.com/libtiff/libtiff/commit/739dcd28a061738b317c1e9f91029d9cbc157159
- https://sourceforge.net/p/graphicsmagick/bugs/540/
- https://sourceforge.net/p/graphicsmagick/bugs/540/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0848
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
- FEDORA-2015-9674
- FEDORA-2015-9674
- FEDORA-2015-14848
- FEDORA-2015-14848
- FEDORA-2015-14847
- FEDORA-2015-14847
- openSUSE-SU-2015:1132
- openSUSE-SU-2015:1132
- openSUSE-SU-2015:1134
- openSUSE-SU-2015:1134
- openSUSE-SU-2015:1212
- openSUSE-SU-2015:1212
- RHSA-2015:1917
- RHSA-2015:1917
- DSA-3302
- DSA-3302
- [oss-security] 20150601 CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150601 CVE-2015-0848 - Heap overflow on libwmf0.2-7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74923
- 74923
- 1032771
- 1032771
- USN-2670-1
- USN-2670-1
- GLSA-201602-03
- GLSA-201602-03
Modified: 2024-11-21
CVE-2015-4588
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
- FEDORA-2015-9674
- FEDORA-2015-9674
- openSUSE-SU-2015:1132
- openSUSE-SU-2015:1132
- openSUSE-SU-2015:1134
- openSUSE-SU-2015:1134
- openSUSE-SU-2015:1212
- openSUSE-SU-2015:1212
- RHSA-2015:1917
- RHSA-2015:1917
- DSA-3302
- DSA-3302
- [oss-security] 20150603 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150603 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150615 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150615 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 75230
- 75230
- 1032771
- 1032771
- USN-2670-1
- USN-2670-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- GLSA-201602-03
- GLSA-201602-03
Modified: 2024-11-21
CVE-2015-4695
meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
- FEDORA-2015-10601
- FEDORA-2015-10601
- openSUSE-SU-2015:1212
- openSUSE-SU-2015:1212
- RHSA-2015:1917
- RHSA-2015:1917
- DSA-3302
- DSA-3302
- [oss-security] 20150617 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150617 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150621 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150621 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 75329
- 75329
- 1032771
- 1032771
- USN-2670-1
- USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- GLSA-201602-03
- GLSA-201602-03
Modified: 2024-11-21
CVE-2015-4696
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
- FEDORA-2015-10601
- FEDORA-2015-10601
- openSUSE-SU-2015:1212
- openSUSE-SU-2015:1212
- RHSA-2015:1917
- RHSA-2015:1917
- DSA-3302
- DSA-3302
- [oss-security] 20150617 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150617 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150621 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- [oss-security] 20150621 Re: CVE-2015-0848 - Heap overflow on libwmf0.2-7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 75331
- 75331
- 1032771
- 1032771
- USN-2670-1
- USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- GLSA-201602-03
- GLSA-201602-03
Modified: 2024-11-21
CVE-2016-9011
The wmf_malloc function in api.c in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (application crash) via a crafted wmf file, which triggers a memory allocation failure.
- [oss-security] 20161025 Re: libwmf: memory allocation failure in wmf_malloc (api.c)
- [oss-security] 20161025 Re: libwmf: memory allocation failure in wmf_malloc (api.c)
- 93860
- 93860
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450