Vulnerability CVE-2017-6462


Published: 2017-03-27

Description:
Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
NTP -> NTP 

 References:
http://support.ntp.org/bin/view/Main/NtpBug3388
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/bid/97045
http://www.securitytracker.com/id/1038123
https://access.redhat.com/errata/RHSA-2017:3071
https://access.redhat.com/errata/RHSA-2018:0855
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
https://support.apple.com/HT208144
https://usn.ubuntu.com/3707-2/

Copyright 2024, cxsecurity.com

 

Back to Top