ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
14 Jan 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:* cpe:2.3:a:synology:diskstation_manager:6.0:*:*:*:*:*:*:* |
cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:* cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:* cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:* |
Information
Published : 2018-03-06 20:29
Updated : 2025-01-14 19:29
NVD link : CVE-2018-7184
Mitre link : CVE-2018-7184
CVE.ORG link : CVE-2018-7184
JSON object : View
Products Affected
synology
- router_manager
- skynas
- vs960hd_firmware
- virtual_diskstation_manager
- diskstation_manager
canonical
- ubuntu_linux
netapp
- steelstore_cloud_integrated_storage
- cloud_backup
slackware
- slackware_linux
ntp
- ntp
CWE