[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:21286
The host is missing a patch containing a security fixes, which affects the following package(s): bos.net.tcp.client and ntp.rte

oval:org.secpod.oval:def:1700715
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service via forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013

oval:org.secpod.oval:def:1501569
The monlist feature in ntp_request.c in ntpd in NTP allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

oval:org.secpod.oval:def:1501567
The monlist feature in ntp_request.c in ntpd in NTP allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

oval:org.secpod.oval:def:1600883
Ephemeral association time spoofing additional protectionntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim#039;s clo ...

CPE    2
cpe:/a:ntp:ntp:4.2.7
cpe:/o:novell:opensuse:11.4
CWE    1
CWE-20
*CVE
CVE-2013-5211

© SecPod Technologies