Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2015-5194
The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.11
EPSS Ranking
93.1%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-0780.html
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://www.debian.org/security/2015/dsa-3388
http://www.openwall.com/lists/oss-security/2015/08/25/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/76475
http://www.ubuntu.com/usn/USN-2783-1
https://bugzilla.redhat.com/show_bug.cgi?id=1254542
https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157
https://www-01.ibm.com/support/docview.wss?uid=swg21985122
https://www-01.ibm.com/support/docview.wss?uid=swg21986956
https://www-01.ibm.com/support/docview.wss?uid=swg21988706
https://www-01.ibm.com/support/docview.wss?uid=swg21989542
http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
http://rhn.redhat.com/errata/RHSA-2016-0780.html
http://rhn.redhat.com/errata/RHSA-2016-2583.html
http://www.debian.org/security/2015/dsa-3388
http://www.openwall.com/lists/oss-security/2015/08/25/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/76475
http://www.ubuntu.com/usn/USN-2783-1
https://bugzilla.redhat.com/show_bug.cgi?id=1254542
https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27
https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157
https://www-01.ibm.com/support/docview.wss?uid=swg21985122
https://www-01.ibm.com/support/docview.wss?uid=swg21986956
https://www-01.ibm.com/support/docview.wss?uid=swg21988706
https://www-01.ibm.com/support/docview.wss?uid=swg21989542
Products affected by CVE-2015-5194
Ntp
»
Ntp
»
Version:
4.2.7
cpe:2.3:a:ntp:ntp:4.2.7
Suse
»
Linux Enterprise Debuginfo
»
Version:
11
cpe:2.3:a:suse:linux_enterprise_debuginfo:11
Canonical
»
Ubuntu Linux
»
Version:
12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
15.04
cpe:2.3:o:canonical:ubuntu_linux:15.04
Canonical
»
Ubuntu Linux
»
Version:
15.10
cpe:2.3:o:canonical:ubuntu_linux:15.10
Debian
»
Debian Linux
»
Version:
7.0
cpe:2.3:o:debian:debian_linux:7.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Fedoraproject
»
Fedora
»
Version:
21
cpe:2.3:o:fedoraproject:fedora:21
Fedoraproject
»
Fedora
»
Version:
22
cpe:2.3:o:fedoraproject:fedora:22
Redhat
»
Enterprise Linux Desktop
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
Redhat
»
Enterprise Linux Desktop
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
Redhat
»
Enterprise Linux Hpc Node
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0
Redhat
»
Enterprise Linux Hpc Node
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0
Redhat
»
Enterprise Linux Server
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0
Redhat
»
Enterprise Linux Server
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0
Redhat
»
Enterprise Linux Workstation
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
Redhat
»
Enterprise Linux Workstation
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Suse
»
Linux Enterprise Server
»
Version:
10
cpe:2.3:o:suse:linux_enterprise_server:10
Suse
»
Linux Enterprise Server
»
Version:
11
cpe:2.3:o:suse:linux_enterprise_server:11
Suse
»
Manager
»
Version:
2.1
cpe:2.3:o:suse:manager:2.1
Suse
»
Manager Proxy
»
Version:
2.1
cpe:2.3:o:suse:manager_proxy:2.1
Suse
»
Openstack Cloud
»
Version:
5
cpe:2.3:o:suse:openstack_cloud:5
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved