Vulnerability Name: | CVE-2014-9750 (CCN-109527) | ||||||||||||||||||||||||
Assigned: | 2015-02-04 | ||||||||||||||||||||||||
Published: | 2015-02-04 | ||||||||||||||||||||||||
Updated: | 2020-06-18 | ||||||||||||||||||||||||
Summary: | ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field. | ||||||||||||||||||||||||
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) 4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||
References: | Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory http://bugs.ntp.org/show_bug.cgi?id=2671 Source: MITRE Type: CNA CVE-2014-9750 Source: REDHAT Type: Third Party Advisory RHSA-2015:1459 Source: CCN Type: NTP Web site SecurityNotice Main NTP Source: CONFIRM Type: Release Notes, Vendor Advisory http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne Source: DEBIAN Type: Third Party Advisory DSA-3388 Source: CCN Type: IBM Security Bulletin T1023291 IBM Pure Power Integrated Manager (PPIM) is affected by vulnerabilities in ntp (CVE-2014-9750, CVE-2014-9751) Source: CCN Type: IBM Security Bulletin T1023431 (PowerKVM) Multiple vulnerabilities in Network Time Protocol (NTP) affect PowerKVM Source: CCN Type: IBM Security Bulletin 1977803 (PureData System for Analytics) Multiple Security Vulnerabilities affecting IBM Netezza Host Management Source: CCN Type: US-CERT VU#852879 Network Time Protocol (NTP) Project NTP daemon (ntpd) contains multiple vulnerabilities Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#852879 Source: CONFIRM Type: Third Party Advisory http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Source: BID Type: Third Party Advisory, VDB Entry 72583 Source: CCN Type: BID-72583 NTP 'ntp_crypto.c' Information Disclosure Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 1184573 (CVE-2014-9297, CVE-2014-9750) CVE-2014-9297 CVE-2014-9750 ntp: vallen in extension fields are not validated Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1184573 Source: XF Type: UNKNOWN ntp-cve20149750-info-disc(109527) Source: CONFIRM Type: Third Party Advisory https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-9750 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration RedHat 9: Configuration RedHat 10: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |