漏洞信息详情
NTP 访问控制错误漏洞
漏洞简介
NTP(Network Time Protocol,网络时间协议)是一款通过网络同步计算机时钟的协议。
NTP 4.2.8:p6及之前的版本中的ntpq存在安全漏洞。远程攻击者可利用该漏洞获取源时间戳,冒充用户。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
http://support.ntp.org/bin/view/Main/NtpBug2946
参考网址
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ORAMN3Q7TVJ54MBYF75XCJOE3DP7LYHT/
来源:CERT-VN
链接:https://www.kb.cert.org/vuls/id/718152
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/K3EYJQHJZ2KTVQ7ICEFHXTLZ36MRASWX/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
来源:GENTOO
链接:https://security.gentoo.org/glsa/201607-15
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/WNWGCQLW2VY72NIUYMJOCAKJKTXHDUK2/
来源:BID
链接:http://www.securityfocus.com/bid/82105
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
来源:CISCO
链接:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd
来源:support.ntp.org
链接:http://support.ntp.org/bin/view/Main/NtpBug2946
来源:bto.bluecoat.com
链接:https://bto.bluecoat.com/security-advisory/sa113
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
来源:SECTRACK
链接:http://www.securitytracker.com/id/1034782
受影响实体
- Ntp Ntp:4.2.8:P6<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...