CVE-2015-7701
7.5HIGHMemory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
Veröffentlicht: 8/7/2017Aktualisiert: 4/20/2025
Beschreibung
Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
KI-AnalyseKI-gestützt
Betroffene Produkte
ntpntp
ntpntp
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
oraclelinux
6
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
netapponcommand_performance_manager
-
netapponcommand_unified_manager
-
netappclustered_data_ontap
-
netappdata_ontap
-
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
Referenzen
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory