CVE-2015-7701
7.5HIGHMemory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
Опубликовано: 8/7/2017Обновлено: 4/20/2025
Описание
Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
ИИ-АнализНа базе ИИ
Затронутые продукты
ntpntp
ntpntp
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
ntpntp
4.2.8
oraclelinux
6
debiandebian_linux
7.0
debiandebian_linux
8.0
debiandebian_linux
9.0
netapponcommand_performance_manager
-
netapponcommand_unified_manager
-
netappclustered_data_ontap
-
netappdata_ontap
-
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_aus
7.6
redhatenterprise_linux_server_aus
7.7
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_eus
7.6
redhatenterprise_linux_server_eus
7.7
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.6
redhatenterprise_linux_server_tus
7.7
redhatenterprise_linux_workstation
6.0
redhatenterprise_linux_workstation
7.0
Ссылки
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0780.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2583.htmlThird Party Advisory
- http://support.ntp.org/bin/view/Main/NtpBug2909Vendor Advisory
- http://www.debian.org/security/2015/dsa-3388Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
- http://www.securityfocus.com/bid/77281Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1033951Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255Issue TrackingThird Party AdvisoryVDB Entry
- https://security.gentoo.org/glsa/201607-15Third Party AdvisoryVDB Entry
- https://security.netapp.com/advisory/ntap-20171004-0001/Third Party Advisory