It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | ntp | 2015-03-23 08:31 | ALAS-2015-496 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.0 | AV:N/AC:L/Au:N/C:P/I:N/A:N |