{"id":"CVE-2015-5300","details":"The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).","modified":"2026-04-10T03:45:21.799395Z","published":"2017-07-21T14:29:00Z","related":["MGASA-2015-0413","SUSE-SU-2016:1175-1","SUSE-SU-2016:1177-1","SUSE-SU-2016:1247-1","SUSE-SU-2016:1311-1","openSUSE-SU-2024:10181-1"],"references":[{"type":"ADVISORY","url":"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170684.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-1930.html"},{"type":"ADVISORY","url":"http://seclists.org/bugtraq/2016/Feb/164"},{"type":"ADVISORY","url":"http://support.ntp.org/bin/view/Main/NtpBug2956"},{"type":"ADVISORY","url":"http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3388"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/77312"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1034670"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2783-1"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa113"},{"type":"ADVISORY","url":"https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171004-0001/"},{"type":"ADVISORY","url":"https://support.citrix.com/article/CTX220112"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=swg21979393"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=swg21980676"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=swg21983501"},{"type":"ADVISORY","url":"https://www-01.ibm.com/support/docview.wss?uid=swg21983506"},{"type":"ADVISORY","url":"https://www.cs.bu.edu/~goldbe/NTPattack.html"},{"type":"ADVISORY","url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:02.ntp.asc"},{"type":"ADVISORY","url":"https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"type":"ARTICLE","url":"http://seclists.org/bugtraq/2016/Feb/164"},{"type":"FIX","url":"http://support.ntp.org/bin/view/Main/NtpBug2956"},{"type":"FIX","url":"http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit"},{"type":"REPORT","url":"http://support.ntp.org/bin/view/Main/NtpBug2956"},{"type":"REPORT","url":"http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1271076"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}