fkie_cve-2015-7871
Vulnerability from fkie_nvd
Published
2017-08-07 20:29
Modified
2024-11-21 02:37
Severity ?
Summary
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.5 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
netapp | oncommand_balance | - | |
netapp | oncommand_performance_manager | - | |
netapp | oncommand_unified_manager | - | |
netapp | clustered_data_ontap | - | |
netapp | data_ontap | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B114E-15BF-4731-9296-A8F82591B418", "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "79494F07-6081-497D-8A2D-B05486599EAE", "versionEndExcluding": "4.3.77", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p186:*:*:*:*:*:*", "matchCriteriaId": "D5D4B9E2-A28F-4E43-980C-698F833D03DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p187:*:*:*:*:*:*", "matchCriteriaId": "3C78C23F-3125-4CAB-B75D-EA105A5C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p188:*:*:*:*:*:*", "matchCriteriaId": "0A5267AF-4F05-4124-89B2-AC705C181FA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p189:*:*:*:*:*:*", "matchCriteriaId": "00E07D52-2DEE-4ACF-AA82-4DD108D25B7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p190:*:*:*:*:*:*", "matchCriteriaId": "A0FB2BFD-AE6A-46D5-828A-0CAE5E445B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p191:*:*:*:*:*:*", "matchCriteriaId": "7A25BD2C-AF41-4438-B32D-44BD331E8D22", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p192:*:*:*:*:*:*", "matchCriteriaId": "10D2C131-7219-4416-9A3F-262615760DC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p193:*:*:*:*:*:*", "matchCriteriaId": "7EE354F9-58B9-4DCD-91EC-030F079EC8E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p194:*:*:*:*:*:*", "matchCriteriaId": "3E129E07-8B34-45C5-BDAC-89B8ECA960DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p195:*:*:*:*:*:*", "matchCriteriaId": "B826EAE0-D9BA-4C7D-A5BE-561E5AB35664", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p196:*:*:*:*:*:*", "matchCriteriaId": "931932A6-D19A-4B85-A90A-BA52D9AFA9F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p197:*:*:*:*:*:*", "matchCriteriaId": "516748AA-9E25-4C2C-8D58-7E75D373F6D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p198:*:*:*:*:*:*", "matchCriteriaId": "61DC3B1A-7264-44F2-915A-716FD133E5C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p199:*:*:*:*:*:*", "matchCriteriaId": "DFD406BC-AFDE-4425-9C63-7D58ADCC24C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p200:*:*:*:*:*:*", "matchCriteriaId": "86F9B4C0-0504-43ED-B64C-894E4B4E77E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p201:*:*:*:*:*:*", "matchCriteriaId": "A2A9EB64-BB4A-4E4E-994B-0145AD134588", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p202:*:*:*:*:*:*", "matchCriteriaId": "655A7FF1-672A-490F-9E41-0AA40A1DEFEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p203:*:*:*:*:*:*", "matchCriteriaId": "EA207F59-B630-4BBB-9CD7-BA7B64581907", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p204:*:*:*:*:*:*", "matchCriteriaId": "06AE2082-B219-4E94-89E8-E1328224C9D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p205:*:*:*:*:*:*", "matchCriteriaId": "6E0F5656-3E41-4568-A810-F2CFA3677488", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p206:*:*:*:*:*:*", "matchCriteriaId": "934152EB-5F5A-4BD8-B832-3B342551F9AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p207:*:*:*:*:*:*", "matchCriteriaId": "6936BEB5-B765-45C5-B671-A9D0CC4988C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p208:*:*:*:*:*:*", "matchCriteriaId": "BAA1E4CD-45EE-4814-AC6B-DE786C5B3B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p209:*:*:*:*:*:*", "matchCriteriaId": "95779DD0-C768-4B1C-A720-23BE19606B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p210:*:*:*:*:*:*", "matchCriteriaId": "1B035472-2B64-4BE4-8D25-6E31937641E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p211:*:*:*:*:*:*", "matchCriteriaId": "3CE88876-F0BB-43A1-9A4A-91C5D6FFC02B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p212:*:*:*:*:*:*", "matchCriteriaId": "4E4BE466-B479-47BA-9A1F-F0184E252103", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p213:*:*:*:*:*:*", "matchCriteriaId": "4E6D7F8F-EF71-44E6-B33F-E0265266C616", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p214:*:*:*:*:*:*", "matchCriteriaId": "AC47FB1E-289A-4AA1-9DF1-0CEE13C9335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p215:*:*:*:*:*:*", "matchCriteriaId": "B7BC8DB4-E715-44F1-8759-0414613C9F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p216:*:*:*:*:*:*", "matchCriteriaId": "5AF5BC27-EE65-4FB4-975E-FA3933B3202C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p217:*:*:*:*:*:*", "matchCriteriaId": "795D50A9-41E5-40CE-88E9-391229607301", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p218:*:*:*:*:*:*", "matchCriteriaId": "1DE4338B-F5B3-4410-886D-0F28A7ECE824", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p219:*:*:*:*:*:*", "matchCriteriaId": "B1463DC6-D0C7-46E6-8418-B7900C99D079", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p220:*:*:*:*:*:*", "matchCriteriaId": "C5B7AA5B-2BD5-4F19-A8BB-DF4677995602", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p221:*:*:*:*:*:*", "matchCriteriaId": "DBCF724B-5018-4794-97D9-D8EDC2F04060", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p222:*:*:*:*:*:*", "matchCriteriaId": "2A62EAF1-3D51-456F-BBE3-A2E8CBE7960D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p223:*:*:*:*:*:*", "matchCriteriaId": "67D86D6C-A8A3-4CD4-B1A5-57941B51C732", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p224:*:*:*:*:*:*", "matchCriteriaId": "E793243F-4179-46C9-B422-DC3D6E688B2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p225:*:*:*:*:*:*", "matchCriteriaId": "6EAC9B6E-3A88-4DED-A5D4-862E076620BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p226:*:*:*:*:*:*", "matchCriteriaId": "AD8E8B74-6E16-47FF-A019-54B0438A8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p227:*:*:*:*:*:*", "matchCriteriaId": "3C210EFA-7BF2-4EEE-B59C-F3C75743E182", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p228:*:*:*:*:*:*", "matchCriteriaId": "23A9CDE2-4520-4542-93B0-74A01E919597", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p229:*:*:*:*:*:*", "matchCriteriaId": "94A7790A-DACE-4F02-B2FF-2C851EFD9717", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p230:*:*:*:*:*:*", "matchCriteriaId": "5ED47A47-3CB2-45CC-8147-CFFE0B93D966", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p231_rc1:*:*:*:*:*:*", "matchCriteriaId": "4FC2172C-73BD-441D-9963-5C9E89FB68F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p232_rc1:*:*:*:*:*:*", "matchCriteriaId": "485C8744-A185-46EB-B27F-8A42ED76964B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p233_rc1:*:*:*:*:*:*", "matchCriteriaId": "C01153E2-A4E3-4EF9-A33E-1026F578CB44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p234_rc1:*:*:*:*:*:*", "matchCriteriaId": "505CE414-C5E5-4251-9F02-A8A0DA6C0E91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p235_rc1:*:*:*:*:*:*", "matchCriteriaId": "607E83FB-FDB7-49CA-9DA9-B8DA43C3DF23", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p236_rc1:*:*:*:*:*:*", "matchCriteriaId": "864BA14B-B357-4ADD-BCE1-B2EAE4D299FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p237_rc1:*:*:*:*:*:*", "matchCriteriaId": "2856AAB8-172F-4657-85FF-9FFB698C4457", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p238_rc1:*:*:*:*:*:*", "matchCriteriaId": "7C2B8290-8AD6-4EDD-9736-730DD33CA73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p239_rc1:*:*:*:*:*:*", "matchCriteriaId": "A509FC81-ABFD-4CE1-ABD6-C47ECCF97892", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p240_rc1:*:*:*:*:*:*", "matchCriteriaId": "7111A1FB-142C-4538-BC96-F71AEDC0FB4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*", "matchCriteriaId": "FB54C36C-F07A-4F99-A093-8EF10689E1C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p242_rc1:*:*:*:*:*:*", "matchCriteriaId": "CD57B6E4-9947-4790-BCAF-30B37C7CB837", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p243_rc1:*:*:*:*:*:*", "matchCriteriaId": "232170D9-923D-4DA5-9A7D-6A5BDCD37165", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p244_rc1:*:*:*:*:*:*", "matchCriteriaId": "A0BE1B30-DB6E-4029-8212-035449CEE22F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p245_rc1:*:*:*:*:*:*", "matchCriteriaId": "3181F3BF-8704-4D54-ABC4-CB68C89AF52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p246_rc1:*:*:*:*:*:*", "matchCriteriaId": "E61A5F5E-8DCC-4809-A2DE-E39C8E01976F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p247_rc1:*:*:*:*:*:*", "matchCriteriaId": "1D2E80CD-0EAA-423B-B885-EDC5BFE962BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p248_rc1:*:*:*:*:*:*", "matchCriteriaId": "11F45456-692B-415D-BDBF-BA639AA622BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p249_rc1:*:*:*:*:*:*", "matchCriteriaId": "FCEF3E6A-48C3-4A00-B286-58E642DE5928", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.5:p250_rc1:*:*:*:*:*:*", "matchCriteriaId": "8CE352E5-DFFC-4580-9D5E-95EE7A5C2BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "212E1878-1B9A-4CB4-A1CE-EAD60B867161", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "matchCriteriaId": "95B173E0-1475-4F8D-A982-86F36BE3DD4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FED6CAE-D97F-49E0-9D00-1642A3A427B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "392A1364-2739-450D-9E19-DFF93081C2C6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication." }, { "lang": "es", "value": "Los paquetes Crypto-NAK en ntpd en NTP 4.2.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permiten que atacantes remotos eludan la autenticaci\u00f3n." } ], "id": "CVE-2015-7871", "lastModified": "2024-11-21T02:37:34.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-07T20:29:00.997", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug2941" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3388" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/77287" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033951" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274265" }, { "source": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug2941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/77287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274265" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.