{"id":"UBUNTU-CVE-2015-1799","details":"The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.","modified":"2026-02-04T03:51:22.612913Z","published":"2015-04-08T00:00:00Z","related":["USN-2567-1"],"upstream":["CVE-2015-1799"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1799"},{"type":"REPORT","url":"http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2567-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-1799"}],"affected":[{"package":{"name":"ntp","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.6.p5+dfsg-3ubuntu2.14.04.3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.3"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu2","1:4.2.6.p5+dfsg-3ubuntu2.14.04.1","1:4.2.6.p5+dfsg-3ubuntu2.14.04.2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.3","binary_name":"ntp"},{"binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.3","binary_name":"ntpdate"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-1799.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}