The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a...
High severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 14, 2025
Description
Published by the National Vulnerability Database
Mar 6, 2018
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Jan 14, 2025
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
References