Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2015-7704
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.52
EPSS Ranking
97.7%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://bugs.ntp.org/show_bug.cgi?id=2901
http://rhn.redhat.com/errata/RHSA-2015-1930.html
http://rhn.redhat.com/errata/RHSA-2015-2520.html
http://support.ntp.org/bin/view/Main/NtpBug2901
http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
http://www.debian.org/security/2015/dsa-3388
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77280
http://www.securitytracker.com/id/1033951
https://bugzilla.redhat.com/show_bug.cgi?id=1271070
https://eprint.iacr.org/2015/1020.pdf
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0001/
https://security.netapp.com/advisory/ntap-20171004-0002/
https://support.citrix.com/article/CTX220112
https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
https://www.cs.bu.edu/~goldbe/NTPattack.html
https://www.kb.cert.org/vuls/id/718152
http://bugs.ntp.org/show_bug.cgi?id=2901
http://rhn.redhat.com/errata/RHSA-2015-1930.html
http://rhn.redhat.com/errata/RHSA-2015-2520.html
http://support.ntp.org/bin/view/Main/NtpBug2901
http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
http://www.debian.org/security/2015/dsa-3388
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77280
http://www.securitytracker.com/id/1033951
https://bugzilla.redhat.com/show_bug.cgi?id=1271070
https://eprint.iacr.org/2015/1020.pdf
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://security.gentoo.org/glsa/201607-15
https://security.netapp.com/advisory/ntap-20171004-0001/
https://security.netapp.com/advisory/ntap-20171004-0002/
https://support.citrix.com/article/CTX220112
https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
https://www.cs.bu.edu/~goldbe/NTPattack.html
https://www.kb.cert.org/vuls/id/718152
Products affected by CVE-2015-7704
Citrix
»
Xenserver
»
Version:
6.0.2
cpe:2.3:a:citrix:xenserver:6.0.2
Citrix
»
Xenserver
»
Version:
6.2.0
cpe:2.3:a:citrix:xenserver:6.2.0
Citrix
»
Xenserver
»
Version:
6.5
cpe:2.3:a:citrix:xenserver:6.5
Citrix
»
Xenserver
»
Version:
7.0
cpe:2.3:a:citrix:xenserver:7.0
Mcafee
»
Enterprise Security Manager
»
Version:
10.0.0
cpe:2.3:a:mcafee:enterprise_security_manager:10.0.0
Mcafee
»
Enterprise Security Manager
»
Version:
10.2.0
cpe:2.3:a:mcafee:enterprise_security_manager:10.2.0
Mcafee
»
Enterprise Security Manager
»
Version:
10.3.4
cpe:2.3:a:mcafee:enterprise_security_manager:10.3.4
Mcafee
»
Enterprise Security Manager
»
Version:
11.0.0
cpe:2.3:a:mcafee:enterprise_security_manager:11.0.0
Mcafee
»
Enterprise Security Manager
»
Version:
11.1.0
cpe:2.3:a:mcafee:enterprise_security_manager:11.1.0
Mcafee
»
Enterprise Security Manager
»
Version:
11.1.1
cpe:2.3:a:mcafee:enterprise_security_manager:11.1.1
Mcafee
»
Enterprise Security Manager
»
Version:
11.1.2
cpe:2.3:a:mcafee:enterprise_security_manager:11.1.2
Mcafee
»
Enterprise Security Manager
»
Version:
11.1.3
cpe:2.3:a:mcafee:enterprise_security_manager:11.1.3
Netapp
»
Oncommand Performance Manager
»
Version:
N/A
cpe:2.3:a:netapp:oncommand_performance_manager:-
Netapp
»
Oncommand Unified Manager
»
Version:
N/A
cpe:2.3:a:netapp:oncommand_unified_manager:-
Ntp
»
Ntp
»
Version:
4.2.0
cpe:2.3:a:ntp:ntp:4.2.0
Ntp
»
Ntp
»
Version:
4.2.2
cpe:2.3:a:ntp:ntp:4.2.2
Ntp
»
Ntp
»
Version:
4.2.4
cpe:2.3:a:ntp:ntp:4.2.4
Ntp
»
Ntp
»
Version:
4.2.5
cpe:2.3:a:ntp:ntp:4.2.5
Ntp
»
Ntp
»
Version:
4.2.6
cpe:2.3:a:ntp:ntp:4.2.6
Ntp
»
Ntp
»
Version:
4.2.7
cpe:2.3:a:ntp:ntp:4.2.7
Ntp
»
Ntp
»
Version:
4.2.7p444
cpe:2.3:a:ntp:ntp:4.2.7p444
Ntp
»
Ntp
»
Version:
4.2.8
cpe:2.3:a:ntp:ntp:4.2.8
Ntp
»
Ntp
»
Version:
4.3.0
cpe:2.3:a:ntp:ntp:4.3.0
Ntp
»
Ntp
»
Version:
4.3.1
cpe:2.3:a:ntp:ntp:4.3.1
Ntp
»
Ntp
»
Version:
4.3.10
cpe:2.3:a:ntp:ntp:4.3.10
Ntp
»
Ntp
»
Version:
4.3.11
cpe:2.3:a:ntp:ntp:4.3.11
Ntp
»
Ntp
»
Version:
4.3.12
cpe:2.3:a:ntp:ntp:4.3.12
Ntp
»
Ntp
»
Version:
4.3.13
cpe:2.3:a:ntp:ntp:4.3.13
Ntp
»
Ntp
»
Version:
4.3.14
cpe:2.3:a:ntp:ntp:4.3.14
Ntp
»
Ntp
»
Version:
4.3.15
cpe:2.3:a:ntp:ntp:4.3.15
Ntp
»
Ntp
»
Version:
4.3.16
cpe:2.3:a:ntp:ntp:4.3.16
Ntp
»
Ntp
»
Version:
4.3.17
cpe:2.3:a:ntp:ntp:4.3.17
Ntp
»
Ntp
»
Version:
4.3.18
cpe:2.3:a:ntp:ntp:4.3.18
Ntp
»
Ntp
»
Version:
4.3.19
cpe:2.3:a:ntp:ntp:4.3.19
Ntp
»
Ntp
»
Version:
4.3.2
cpe:2.3:a:ntp:ntp:4.3.2
Ntp
»
Ntp
»
Version:
4.3.20
cpe:2.3:a:ntp:ntp:4.3.20
Ntp
»
Ntp
»
Version:
4.3.21
cpe:2.3:a:ntp:ntp:4.3.21
Ntp
»
Ntp
»
Version:
4.3.22
cpe:2.3:a:ntp:ntp:4.3.22
Ntp
»
Ntp
»
Version:
4.3.23
cpe:2.3:a:ntp:ntp:4.3.23
Ntp
»
Ntp
»
Version:
4.3.24
cpe:2.3:a:ntp:ntp:4.3.24
Ntp
»
Ntp
»
Version:
4.3.25
cpe:2.3:a:ntp:ntp:4.3.25
Ntp
»
Ntp
»
Version:
4.3.26
cpe:2.3:a:ntp:ntp:4.3.26
Ntp
»
Ntp
»
Version:
4.3.27
cpe:2.3:a:ntp:ntp:4.3.27
Ntp
»
Ntp
»
Version:
4.3.28
cpe:2.3:a:ntp:ntp:4.3.28
Ntp
»
Ntp
»
Version:
4.3.29
cpe:2.3:a:ntp:ntp:4.3.29
Ntp
»
Ntp
»
Version:
4.3.3
cpe:2.3:a:ntp:ntp:4.3.3
Ntp
»
Ntp
»
Version:
4.3.30
cpe:2.3:a:ntp:ntp:4.3.30
Ntp
»
Ntp
»
Version:
4.3.31
cpe:2.3:a:ntp:ntp:4.3.31
Ntp
»
Ntp
»
Version:
4.3.32
cpe:2.3:a:ntp:ntp:4.3.32
Ntp
»
Ntp
»
Version:
4.3.33
cpe:2.3:a:ntp:ntp:4.3.33
Ntp
»
Ntp
»
Version:
4.3.34
cpe:2.3:a:ntp:ntp:4.3.34
Ntp
»
Ntp
»
Version:
4.3.35
cpe:2.3:a:ntp:ntp:4.3.35
Ntp
»
Ntp
»
Version:
4.3.36
cpe:2.3:a:ntp:ntp:4.3.36
Ntp
»
Ntp
»
Version:
4.3.37
cpe:2.3:a:ntp:ntp:4.3.37
Ntp
»
Ntp
»
Version:
4.3.38
cpe:2.3:a:ntp:ntp:4.3.38
Ntp
»
Ntp
»
Version:
4.3.39
cpe:2.3:a:ntp:ntp:4.3.39
Ntp
»
Ntp
»
Version:
4.3.4
cpe:2.3:a:ntp:ntp:4.3.4
Ntp
»
Ntp
»
Version:
4.3.40
cpe:2.3:a:ntp:ntp:4.3.40
Ntp
»
Ntp
»
Version:
4.3.41
cpe:2.3:a:ntp:ntp:4.3.41
Ntp
»
Ntp
»
Version:
4.3.42
cpe:2.3:a:ntp:ntp:4.3.42
Ntp
»
Ntp
»
Version:
4.3.43
cpe:2.3:a:ntp:ntp:4.3.43
Ntp
»
Ntp
»
Version:
4.3.44
cpe:2.3:a:ntp:ntp:4.3.44
Ntp
»
Ntp
»
Version:
4.3.45
cpe:2.3:a:ntp:ntp:4.3.45
Ntp
»
Ntp
»
Version:
4.3.46
cpe:2.3:a:ntp:ntp:4.3.46
Ntp
»
Ntp
»
Version:
4.3.47
cpe:2.3:a:ntp:ntp:4.3.47
Ntp
»
Ntp
»
Version:
4.3.48
cpe:2.3:a:ntp:ntp:4.3.48
Ntp
»
Ntp
»
Version:
4.3.49
cpe:2.3:a:ntp:ntp:4.3.49
Ntp
»
Ntp
»
Version:
4.3.5
cpe:2.3:a:ntp:ntp:4.3.5
Ntp
»
Ntp
»
Version:
4.3.50
cpe:2.3:a:ntp:ntp:4.3.50
Ntp
»
Ntp
»
Version:
4.3.51
cpe:2.3:a:ntp:ntp:4.3.51
Ntp
»
Ntp
»
Version:
4.3.52
cpe:2.3:a:ntp:ntp:4.3.52
Ntp
»
Ntp
»
Version:
4.3.53
cpe:2.3:a:ntp:ntp:4.3.53
Ntp
»
Ntp
»
Version:
4.3.54
cpe:2.3:a:ntp:ntp:4.3.54
Ntp
»
Ntp
»
Version:
4.3.55
cpe:2.3:a:ntp:ntp:4.3.55
Ntp
»
Ntp
»
Version:
4.3.56
cpe:2.3:a:ntp:ntp:4.3.56
Ntp
»
Ntp
»
Version:
4.3.57
cpe:2.3:a:ntp:ntp:4.3.57
Ntp
»
Ntp
»
Version:
4.3.58
cpe:2.3:a:ntp:ntp:4.3.58
Ntp
»
Ntp
»
Version:
4.3.59
cpe:2.3:a:ntp:ntp:4.3.59
Ntp
»
Ntp
»
Version:
4.3.6
cpe:2.3:a:ntp:ntp:4.3.6
Ntp
»
Ntp
»
Version:
4.3.60
cpe:2.3:a:ntp:ntp:4.3.60
Ntp
»
Ntp
»
Version:
4.3.61
cpe:2.3:a:ntp:ntp:4.3.61
Ntp
»
Ntp
»
Version:
4.3.62
cpe:2.3:a:ntp:ntp:4.3.62
Ntp
»
Ntp
»
Version:
4.3.63
cpe:2.3:a:ntp:ntp:4.3.63
Ntp
»
Ntp
»
Version:
4.3.64
cpe:2.3:a:ntp:ntp:4.3.64
Ntp
»
Ntp
»
Version:
4.3.65
cpe:2.3:a:ntp:ntp:4.3.65
Ntp
»
Ntp
»
Version:
4.3.66
cpe:2.3:a:ntp:ntp:4.3.66
Ntp
»
Ntp
»
Version:
4.3.67
cpe:2.3:a:ntp:ntp:4.3.67
Ntp
»
Ntp
»
Version:
4.3.68
cpe:2.3:a:ntp:ntp:4.3.68
Ntp
»
Ntp
»
Version:
4.3.69
cpe:2.3:a:ntp:ntp:4.3.69
Ntp
»
Ntp
»
Version:
4.3.7
cpe:2.3:a:ntp:ntp:4.3.7
Ntp
»
Ntp
»
Version:
4.3.70
cpe:2.3:a:ntp:ntp:4.3.70
Ntp
»
Ntp
»
Version:
4.3.71
cpe:2.3:a:ntp:ntp:4.3.71
Ntp
»
Ntp
»
Version:
4.3.72
cpe:2.3:a:ntp:ntp:4.3.72
Ntp
»
Ntp
»
Version:
4.3.73
cpe:2.3:a:ntp:ntp:4.3.73
Ntp
»
Ntp
»
Version:
4.3.74
cpe:2.3:a:ntp:ntp:4.3.74
Ntp
»
Ntp
»
Version:
4.3.75
cpe:2.3:a:ntp:ntp:4.3.75
Ntp
»
Ntp
»
Version:
4.3.76
cpe:2.3:a:ntp:ntp:4.3.76
Ntp
»
Ntp
»
Version:
4.3.8
cpe:2.3:a:ntp:ntp:4.3.8
Ntp
»
Ntp
»
Version:
4.3.9
cpe:2.3:a:ntp:ntp:4.3.9
Debian
»
Debian Linux
»
Version:
7.0
cpe:2.3:o:debian:debian_linux:7.0
Debian
»
Debian Linux
»
Version:
8.0
cpe:2.3:o:debian:debian_linux:8.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Netapp
»
Clustered Data Ontap
»
Version:
N/A
cpe:2.3:o:netapp:clustered_data_ontap:-
Netapp
»
Data Ontap
»
Version:
N/A
cpe:2.3:o:netapp:data_ontap:-
Redhat
»
Enterprise Linux Desktop
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0
Redhat
»
Enterprise Linux Desktop
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
Redhat
»
Enterprise Linux Server
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_server:6.0
Redhat
»
Enterprise Linux Server
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0
Redhat
»
Enterprise Linux Server Aus
»
Version:
6.5
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5
Redhat
»
Enterprise Linux Server Aus
»
Version:
6.6
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6
Redhat
»
Enterprise Linux Server Aus
»
Version:
7.3
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3
Redhat
»
Enterprise Linux Server Aus
»
Version:
7.4
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4
Redhat
»
Enterprise Linux Server Aus
»
Version:
7.6
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
Redhat
»
Enterprise Linux Server Aus
»
Version:
7.7
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7
Redhat
»
Enterprise Linux Server Eus
»
Version:
6.5
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5
Redhat
»
Enterprise Linux Server Eus
»
Version:
6.6
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6
Redhat
»
Enterprise Linux Server Eus
»
Version:
6.7
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.1
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.3
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.4
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.5
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.6
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
Redhat
»
Enterprise Linux Server Eus
»
Version:
7.7
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7
Redhat
»
Enterprise Linux Server Tus
»
Version:
6.5
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5
Redhat
»
Enterprise Linux Server Tus
»
Version:
6.6
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6
Redhat
»
Enterprise Linux Server Tus
»
Version:
7.3
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3
Redhat
»
Enterprise Linux Server Tus
»
Version:
7.6
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
Redhat
»
Enterprise Linux Server Tus
»
Version:
7.7
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7
Redhat
»
Enterprise Linux Workstation
»
Version:
6.0
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0
Redhat
»
Enterprise Linux Workstation
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved