An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netapp
Netapp clustered Data Ontap Netapp data Ontap Operating In 7-mode Netapp oncommand Balance Netapp oncommand Performance Manager Netapp oncommand Unified Manager Ntp ntp |
|
CPEs | cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:data_ontap_operating_in_7-mode:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:* cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:* cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:* |
|
Vendors & Products |
Ntp ntp-dev
|
Netapp
Netapp clustered Data Ontap Netapp data Ontap Operating In 7-mode Netapp oncommand Balance Netapp oncommand Performance Manager Netapp oncommand Unified Manager Ntp ntp |
Metrics |
cvssV3_0
|
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2017-01-06T21:00:00
Updated: 2024-08-06T07:59:00.544Z
Reserved: 2015-10-16T00:00:00
Link: CVE-2015-7848

No data.

Status : Analyzed
Published: 2017-01-06T21:59:00.243
Modified: 2025-05-23T02:15:39.010
Link: CVE-2015-7848
