{"id":"USN-3349-1","summary":"ntp vulnerabilities","details":"Yihan Lian discovered that NTP incorrectly handled certain large request\ndata values. A remote attacker could possibly use this issue to cause NTP\nto crash, resulting in a denial of service. This issue only affected\nUbuntu 16.04 LTS. (CVE-2016-2519)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain spoofed\naddresses when performing rate limiting. A remote attacker could possibly\nuse this issue to perform a denial of service. This issue only affected\nUbuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 16.10. (CVE-2016-7426)\n\nMatthew Van Gundy discovered that NTP incorrectly handled certain crafted\nbroadcast mode packets. A remote attacker could possibly use this issue to\nperform a denial of service. This issue only affected Ubuntu 14.04 LTS,\nUbuntu 16.04 LTS, and Ubuntu 16.10. (CVE-2016-7427, CVE-2016-7428)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain responses.\nA remote attacker could possibly use this issue to perform a denial of\nservice. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and\nUbuntu 16.10. (CVE-2016-7429)\n\nSharon Goldberg and Aanchal Malhotra discovered that NTP incorrectly\nhandled origin timestamps of zero. A remote attacker could possibly use\nthis issue to bypass the origin timestamp protection mechanism. This issue\nonly affected Ubuntu 16.10. (CVE-2016-7431)\n\nBrian Utterback, Sharon Goldberg and Aanchal Malhotra discovered that NTP\nincorrectly performed initial sync calculations. This issue only applied\nto Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-7433)\n\nMagnus Stubman discovered that NTP incorrectly handled certain mrulist\nqueries. A remote attacker could possibly use this issue to cause NTP to\ncrash, resulting in a denial of service. This issue only affected Ubuntu\n16.04 LTS and Ubuntu 16.10. (CVE-2016-7434)\n\nMatthew Van Gund discovered that NTP incorrectly handled origin timestamp\nchecks. A remote attacker could possibly use this issue to perform a denial\nof service. This issue only affected Ubuntu Ubuntu 16.10, and Ubuntu 17.04.\n(CVE-2016-9042)\n\nMatthew Van Gundy discovered that NTP incorrectly handled certain control\nmode packets. A remote attacker could use this issue to set or unset traps.\nThis issue only applied to Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu\n16.10. (CVE-2016-9310)\n\nMatthew Van Gundy discovered that NTP incorrectly handled the trap service.\nA remote attacker could possibly use this issue to cause NTP to crash,\nresulting in a denial of service. This issue only applied to Ubuntu 14.04\nLTS, Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-9311)\n\nIt was discovered that NTP incorrectly handled memory when processing long\nvariables. A remote authenticated user could possibly use this issue to\ncause NTP to crash, resulting in a denial of service. (CVE-2017-6458)\n\nIt was discovered that NTP incorrectly handled memory when processing long\nvariables. A remote authenticated user could possibly use this issue to\ncause NTP to crash, resulting in a denial of service. This issue only\napplied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-6460)\n\nIt was discovered that the NTP legacy DPTS refclock driver incorrectly\nhandled the /dev/datum device. A local attacker could possibly use this\nissue to cause a denial of service. (CVE-2017-6462)\n\nIt was discovered that NTP incorrectly handled certain invalid settings\nin a :config directive. A remote authenticated user could possibly use\nthis issue to cause NTP to crash, resulting in a denial of service.\n(CVE-2017-6463)\n\nIt was discovered that NTP incorrectly handled certain invalid mode\nconfiguration directives. A remote authenticated user could possibly use\nthis issue to cause NTP to crash, resulting in a denial of service.\n(CVE-2017-6464)\n","modified":"2026-02-10T04:41:09Z","published":"2017-07-05T18:19:15Z","related":["UBUNTU-CVE-2016-2519","UBUNTU-CVE-2016-7426","UBUNTU-CVE-2016-7427","UBUNTU-CVE-2016-7428","UBUNTU-CVE-2016-7429","UBUNTU-CVE-2016-7433","UBUNTU-CVE-2016-7434","UBUNTU-CVE-2016-9310","UBUNTU-CVE-2016-9311","UBUNTU-CVE-2017-6458","UBUNTU-CVE-2017-6460","UBUNTU-CVE-2017-6462","UBUNTU-CVE-2017-6463","UBUNTU-CVE-2017-6464"],"upstream":["CVE-2016-2519","CVE-2016-7426","CVE-2016-7427","CVE-2016-7428","CVE-2016-7429","CVE-2016-7431","CVE-2016-7433","CVE-2016-7434","CVE-2016-9042","CVE-2016-9310","CVE-2016-9311","CVE-2017-6458","CVE-2017-6460","CVE-2017-6462","CVE-2017-6463","CVE-2017-6464","UBUNTU-CVE-2016-2519","UBUNTU-CVE-2016-7426","UBUNTU-CVE-2016-7427","UBUNTU-CVE-2016-7428","UBUNTU-CVE-2016-7429","UBUNTU-CVE-2016-7431","UBUNTU-CVE-2016-7433","UBUNTU-CVE-2016-7434","UBUNTU-CVE-2016-9042","UBUNTU-CVE-2016-9310","UBUNTU-CVE-2016-9311","UBUNTU-CVE-2017-6458","UBUNTU-CVE-2017-6460","UBUNTU-CVE-2017-6462","UBUNTU-CVE-2017-6463","UBUNTU-CVE-2017-6464"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3349-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2519"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7426"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7427"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7428"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7429"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7431"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7433"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-7434"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9042"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9310"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9311"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6460"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6462"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6463"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-6464"}],"affected":[{"package":{"name":"ntp","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.6.p5+dfsg-3ubuntu2.14.04.11?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.11"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu2","1:4.2.6.p5+dfsg-3ubuntu2.14.04.1","1:4.2.6.p5+dfsg-3ubuntu2.14.04.2","1:4.2.6.p5+dfsg-3ubuntu2.14.04.3","1:4.2.6.p5+dfsg-3ubuntu2.14.04.5","1:4.2.6.p5+dfsg-3ubuntu2.14.04.6","1:4.2.6.p5+dfsg-3ubuntu2.14.04.7","1:4.2.6.p5+dfsg-3ubuntu2.14.04.8","1:4.2.6.p5+dfsg-3ubuntu2.14.04.10"],"ecosystem_specific":{"binaries":[{"binary_name":"ntp","binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.11"},{"binary_name":"ntpdate","binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.11"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2016-7426","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7427","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7428","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7429","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-9310","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-9311","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-6458","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2017-6462","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2017-6463","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-6464","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3349-1.json"}},{"package":{"name":"ntp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p4+dfsg-3ubuntu5.5?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2.8p4+dfsg-3ubuntu5.5"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu8","1:4.2.6.p5+dfsg-3ubuntu8.1","1:4.2.6.p5+dfsg-3ubuntu9","1:4.2.8p4+dfsg-3ubuntu1","1:4.2.8p4+dfsg-3ubuntu2","1:4.2.8p4+dfsg-3ubuntu3","1:4.2.8p4+dfsg-3ubuntu4","1:4.2.8p4+dfsg-3ubuntu5","1:4.2.8p4+dfsg-3ubuntu5.1","1:4.2.8p4+dfsg-3ubuntu5.2","1:4.2.8p4+dfsg-3ubuntu5.3","1:4.2.8p4+dfsg-3ubuntu5.4"],"ecosystem_specific":{"binaries":[{"binary_name":"ntp","binary_version":"1:4.2.8p4+dfsg-3ubuntu5.5"},{"binary_name":"ntpdate","binary_version":"1:4.2.8p4+dfsg-3ubuntu5.5"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-2519","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7426","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7427","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7428","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7429","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-7433","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-7434","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-9310","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-9311","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-6458","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2017-6460","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-6462","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]},{"id":"CVE-2017-6463","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2017-6464","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3349-1.json"}}],"schema_version":"1.7.3"}