It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | ntp | 2016-06-02 18:06 | ALAS-2016-708 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 6.4 | AV:N/AC:L/Au:N/C:N/I:P/A:P |
NVD | CVSSv3 | 7.2 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L |
NVD | CVSSv2 | 6.4 | AV:N/AC:L/Au:N/C:N/I:P/A:P |