CVE-2015-7977
Medium
Low
Medium
High
Critical
5.9
CVSS Score
Vulnerability Description
ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
N
Attack Complexity
H
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H
Known Affected Software
126 configuration(s) from 8 vendor(s)
ubuntu_linux
Version:
14.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
ubuntu_linux
Version:
16.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
ubuntu_linux
Version:
12.04
CPE:
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
debian_linux
Version:
8.0
CPE:
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian_linux
Version:
9.0
CPE:
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
fedora
Version:
22
CPE:
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
fedora
Version:
23
CPE:
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
freebsd
Version:
10.2
CPE:
cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*
freebsd
Version:
10.1
CPE:
cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*
freebsd
Version:
9.3
CPE:
cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*
clustered_data_ontap
Version:
-
CPE:
cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
oncommand_balance
Version:
-
CPE:
cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
ntp
Version:
4.3.78
CPE:
cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*
ntp
Version:
4.3.75
CPE:
cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*
ntp
Version:
4.0.72
CPE:
cpe:2.3:a:ntp:ntp:4.0.72:*:*:*:*:*:*:*
ntp
Version:
4.3.70
CPE:
cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*
ntp
Version:
4.1.2
CPE:
cpe:2.3:a:ntp:ntp:4.1.2:*:*:*:*:*:*:*
ntp
Version:
4.3.6
CPE:
cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*
ntp
Version:
4.3.44
CPE:
cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*
ntp
Version:
4.2.8
CPE:
cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*
ntp
Version:
4.3.26
CPE:
cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*
ntp
Version:
4.3.60
CPE:
cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*
ntp
Version:
4.0.73
CPE:
cpe:2.3:a:ntp:ntp:4.0.73:*:*:*:*:*:*:*
ntp
Version:
4.0.97
CPE:
cpe:2.3:a:ntp:ntp:4.0.97:*:*:*:*:*:*:*
ntp
Version:
4.0.98
CPE:
cpe:2.3:a:ntp:ntp:4.0.98:*:*:*:*:*:*:*
ntp
Version:
4.3.47
CPE:
cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*
ntp
Version:
4.3.35
CPE:
cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*
ntp
Version:
4.3.37
CPE:
cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*
ntp
Version:
4.2.6
CPE:
cpe:2.3:a:ntp:ntp:4.2.6:p2:*:*:*:*:*:*
ntp
Version:
4.3.58
CPE:
cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*
ntp
Version:
4.3.32
CPE:
cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*
ntp
Version:
4.3.22
CPE:
cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*
ntp
Version:
4.3.88
CPE:
cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*
ntp
Version:
4.3.15
CPE:
cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*
ntp
Version:
4.0.93
CPE:
cpe:2.3:a:ntp:ntp:4.0.93:*:*:*:*:*:*:*
ntp
Version:
4.0.91
CPE:
cpe:2.3:a:ntp:ntp:4.0.91:*:*:*:*:*:*:*
ntp
Version:
4.3.76
CPE:
cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*
ntp
Version:
4.3.77
CPE:
cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*
ntp
Version:
4.3.62
CPE:
cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*
ntp
Version:
4.3.38
CPE:
cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*
ntp
Version:
4.3.57
CPE:
cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*
ntp
Version:
4.3.7
CPE:
cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*
ntp
Version:
4.2.5
CPE:
cpe:2.3:a:ntp:ntp:4.2.5:p241_rc1:*:*:*:*:*:*
ntp
Version:
4.3.40
CPE:
cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*
ntp
Version:
4.3.73
CPE:
cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*
ntp
Version:
4.0.99
CPE:
cpe:2.3:a:ntp:ntp:4.0.99:*:*:*:*:*:*:*
ntp
Version:
4.3.46
CPE:
cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*
ntp
Version:
4.3.61
CPE:
cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*
ntp
Version:
4.3.4
CPE:
cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*
ntp
Version:
4.3.72
CPE:
cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*
ntp
Version:
4.3.8
CPE:
cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*
ntp
Version:
4.0.90
CPE:
cpe:2.3:a:ntp:ntp:4.0.90:*:*:*:*:*:*:*
ntp
Version:
4.3.52
CPE:
cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*
ntp
Version:
4.2.2
CPE:
cpe:2.3:a:ntp:ntp:4.2.2:p2:*:*:*:*:*:*
ntp
Version:
4.3.17
CPE:
cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*
ntp
Version:
4.3.66
CPE:
cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*
ntp
Version:
4.3.64
CPE:
cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*
ntp
Version:
4.3.24
CPE:
cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*
ntp
Version:
4.3.3
CPE:
cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*
ntp
Version:
4.0.92
CPE:
cpe:2.3:a:ntp:ntp:4.0.92:*:*:*:*:*:*:*
ntp
Version:
4.0
CPE:
cpe:2.3:a:ntp:ntp:4.0:*:*:*:*:*:*:*
ntp
Version:
4.3.48
CPE:
cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*
ntp
Version:
4.0.95
CPE:
cpe:2.3:a:ntp:ntp:4.0.95:*:*:*:*:*:*:*
ntp
Version:
4.3.85
CPE:
cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*
ntp
Version:
4.0.94
CPE:
cpe:2.3:a:ntp:ntp:4.0.94:*:*:*:*:*:*:*
ntp
Version:
4.3.84
CPE:
cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*
ntp
Version:
4.3.89
CPE:
cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*
ntp
Version:
4.3.0
CPE:
cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*
ntp
Version:
4.3.27
CPE:
cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*
ntp
Version:
4.3.19
CPE:
cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*
ntp
Version:
4.3.45
CPE:
cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*
ntp
Version:
4.3.67
CPE:
cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*
ntp
Version:
4.3.16
CPE:
cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*
ntp
Version:
4.3.80
CPE:
cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*
ntp
Version:
4.3.2
CPE:
cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*
ntp
Version:
4.3.79
CPE:
cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*
ntp
Version:
4.2.4
CPE:
cpe:2.3:a:ntp:ntp:4.2.4:p0:*:*:*:*:*:*
ntp
Version:
4.3.18
CPE:
cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*
ntp
Version:
4.2.7
CPE:
cpe:2.3:a:ntp:ntp:4.2.7:-:*:*:*:*:*:*
ntp
Version:
4.3.51
CPE:
cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*
ntp
Version:
4.3.56
CPE:
cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*
ntp
Version:
4.3.34
CPE:
cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*
ntp
Version:
4.3.69
CPE:
cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*
ntp
Version:
4.3.28
CPE:
cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*
ntp
Version:
4.3.59
CPE:
cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*
ntp
Version:
4.3.71
CPE:
cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*
ntp
Version:
4.3.10
CPE:
cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*
ntp
Version:
4.3.20
CPE:
cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*
ntp
Version:
4.3.81
CPE:
cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*
ntp
Version:
4.3.74
CPE:
cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*
ntp
Version:
4.3.83
CPE:
cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*
ntp
Version:
4.3.65
CPE:
cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*
ntp
Version:
4.3.14
CPE:
cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*
ntp
Version:
4.3.43
CPE:
cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*
ntp
Version:
4.3.49
CPE:
cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*
ntp
Version:
4.3.12
CPE:
cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*
ntp
Version:
4.3.50
CPE:
cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*
ntp
Version:
4.3.1
CPE:
cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*
ntp
Version:
4.3.82
CPE:
cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*
ntp
Version:
4.3.13
CPE:
cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*
ntp
Version:
4.3.9
CPE:
cpe:2.3:a:ntp:ntp:4.3.9:*:*:*:*:*:*:*
ntp
Version:
4.1.0
CPE:
cpe:2.3:a:ntp:ntp:4.1.0:*:*:*:*:*:*:*
ntp
Version:
4.3.5
CPE:
cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*
ntp
Version:
4.3.86
CPE:
cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*
ntp
Version:
4.2.0
CPE:
cpe:2.3:a:ntp:ntp:4.2.0:*:*:*:*:*:*:*
ntp
Version:
4.3.41
CPE:
cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*
ntp
Version:
4.0.96
CPE:
cpe:2.3:a:ntp:ntp:4.0.96:*:*:*:*:*:*:*
ntp
Version:
4.3.30
CPE:
cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*
ntp
Version:
4.3.36
CPE:
cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*
ntp
Version:
4.3.11
CPE:
cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*
ntp
Version:
4.3.87
CPE:
cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*
ntp
Version:
4.3.55
CPE:
cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*
ntp
Version:
4.3.21
CPE:
cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*
ntp
Version:
4.3.33
CPE:
cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*
ntp
Version:
4.3.53
CPE:
cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*
ntp
Version:
4.3.31
CPE:
cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*
ntp
Version:
4.3.23
CPE:
cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*
ntp
Version:
4.3.68
CPE:
cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*
ntp
Version:
4.3.39
CPE:
cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*
ntp
Version:
4.3.29
CPE:
cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*
ntp
Version:
4.3.63
CPE:
cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*
ntp
Version:
4.3.42
CPE:
cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*
ntp
Version:
4.3.54
CPE:
cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*
ntp
Version:
4.3.25
CPE:
cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*
linux
Version:
6
CPE:
cpe:2.3:o:oracle:linux:6:10:*:*:*:*:*:*
tim_4r-ie_dnp3_firmware
Version:
-
CPE:
cpe:2.3:o:siemens:tim_4r-ie_dnp3_firmware:-:*:*:*:*:*:*:*
This vulnerability affects 126 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.htmlcve@mitre.org Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.htmlcve@mitre.org Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.htmlcve@mitre.org Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.htmlcve@mitre.org Broken Link
-
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlcve@mitre.org Broken Link
-
http://rhn.redhat.com/errata/RHSA-2016-0780.htmlcve@mitre.org Broken Link
-
http://rhn.redhat.com/errata/RHSA-2016-2583.htmlcve@mitre.org Broken Link
-
http://support.ntp.org/bin/view/Main/NtpBug2939cve@mitre.org Vendor Advisory
-
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Securitycve@mitre.org Vendor Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdcve@mitre.org Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3629cve@mitre.org Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlcve@mitre.org Third Party Advisory
-
http://www.securityfocus.com/bid/81815cve@mitre.org Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1034782cve@mitre.org Third Party Advisory VDB Entry
-
http://www.ubuntu.com/usn/USN-3096-1cve@mitre.org Third Party Advisory
-
https://bto.bluecoat.com/security-advisory/sa113cve@mitre.org Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdfcve@mitre.org Third Party Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asccve@mitre.org Third Party Advisory
-
https://security.gentoo.org/glsa/201607-15cve@mitre.org Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20171031-0001/cve@mitre.org Third Party Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11cve@mitre.org Third Party Advisory US Government Resource
-
https://www.kb.cert.org/vuls/id/718152cve@mitre.org Third Party Advisory US Government Resource
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://rhn.redhat.com/errata/RHSA-2016-0780.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://rhn.redhat.com/errata/RHSA-2016-2583.htmlaf854a3a-2127-422b-91ae-364da2661108 Broken Link
-
http://support.ntp.org/bin/view/Main/NtpBug2939af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Securityaf854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3629af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/bid/81815af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1034782af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.ubuntu.com/usn/USN-3096-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://bto.bluecoat.com/security-advisory/sa113af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdfaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.ascaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.gentoo.org/glsa/201607-15af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20171031-0001/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory US Government Resource
-
https://www.kb.cert.org/vuls/id/718152af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory US Government Resource
Severity Details
5.9
out of 10.0
Medium
Weakness Type (CWE)
CWE-476
Top 25 #21
NULL Pointer Dereference
- Description
- The product dereferences a pointer that it expects to be valid but is NULL.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- January 30, 2017
