[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Memory corruption vulnerability in the refclock of ntpd via an invalid length field

ID: oval:org.secpod.oval:def:31660Date: (C)2015-12-02   (M)2017-10-12
Class: VULNERABILITYFamily: unix




The host is installed with ntp on Red Hat Enterprise Linux 5, 6 or 7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an invalid length field. Successful exploitation could could cause a buffer overflow potentially resulting in memory being modified.

Platform:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Product:
ntp
Reference:
CVE-2015-7853
CVE    1
CVE-2015-7853
CPE    773
cpe:/a:ntp:ntp
cpe:/a:ntp:ntp:4.2.4
cpe:/a:ntp:ntp:4.2.0
cpe:/a:ntp:ntp:4.2.2
...

© 2013 SecPod Technologies