CVE-2015-7701
7.5HIGHMemory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
Publicado: 8/7/2017Atualizado: 4/20/2025
Descrição
Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
Análise IADesenvolvido por IA
Produtos Afetados
ntpntp
ntpntp
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
oraclelinux
6
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
netapponcommand_performance_manager
-
netapponcommand_unified_manager
-
netappclustered_data_ontap
-
netappdata_ontap
-
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
Referências
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory