An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/77275 | Broken Link |
| http://www.securitytracker.com/id/1033951 | Broken Link |
| http://www.talosintelligence.com/reports/TALOS-2015-0052/ | Exploit Technical Description Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201607-15 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20171004-0001/ | Third Party Advisory |
| http://www.securityfocus.com/bid/77275 | Broken Link |
| http://www.securitytracker.com/id/1033951 | Broken Link |
| http://www.talosintelligence.com/reports/TALOS-2015-0052/ | Exploit Technical Description Third Party Advisory VDB Entry |
| https://security.gentoo.org/glsa/201607-15 | Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20171004-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2017-01-06 21:59
Updated : 2025-05-23 02:15
NVD link : CVE-2015-7848
Mitre link : CVE-2015-7848
CVE.ORG link : CVE-2015-7848
JSON object : View
Products Affected
netapp
- oncommand_balance
- clustered_data_ontap
- oncommand_unified_manager
- oncommand_performance_manager
- data_ontap_operating_in_7-mode
ntp
- ntp
CWE
CWE-190
Integer Overflow or Wraparound
