漏洞标题
N/A
漏洞描述信息
ntpd在NTP 4.2.8p3和NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92依赖于底层操作系统来保护它免受模拟参考时钟的请求。因为参考时钟被视为其他对等方,并存储在相同的结构中,任何具有参考时钟(例如127.127.1.1)源IP地址的 packets 都会匹配该参考时钟的对等记录,并被视为一个受信任的对等方。任何缺乏典型火星 packet filtering 的系统都面临被攻击者控制时间的危险。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
ntpd 安全漏洞
漏洞描述信息
ntpd(Network Time Protocol daemon)是一个操作系统守护进程,它使用网络时间协议(NTP)与时间服务器的系统时间保持同步。 ntpd 4.2.8p7之前4.x版本和4.3.92之前4.3版本中存在安全漏洞。当程序使用参考时钟时,攻击者可利用该漏洞注入数据包。
CVSS信息
N/A
漏洞类别
授权问题