The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2017-08-07 20:29
Updated : 2021-07-16 13:15
NVD link : CVE-2015-7853
Mitre link : CVE-2015-7853
CVE.ORG link : CVE-2015-7853
JSON object : View
Products Affected
netapp
- oncommand_balance
- clustered_data_ontap
- oncommand_unified_manager
- oncommand_performance_manager
- data_ontap
ntp
- ntp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')