CVE-2015-7976

Severity

40%

Complexity

80%

Confidentiality

48%

The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.

The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.

CVSS 3.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).

CVSS 2.0 Base Score 4. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N).

Overview

First reported 8 years ago

2017-01-30 21:59:00

Last updated 6 years ago

2018-10-30 16:27:00

Affected Software

NTP 4.1.2

4.1.2

NTP 4.3.0

4.3.0

NTP 4.3.1

4.3.1

NTP 4.3.2

4.3.2

NTP 4.3.3

4.3.3

NTP 4.3.4

4.3.4

NTP 4.3.5

4.3.5

NTP 4.3.6

4.3.6

NTP 4.3.7

4.3.7

NTP 4.3.8

4.3.8

NTP 4.3.9

4.3.9

NTP 4.3.10

4.3.10

NTP 4.3.11

4.3.11

NTP 4.3.12

4.3.12

NTP 4.3.13

4.3.13

NTP 4.3.14

4.3.14

NTP 4.3.15

4.3.15

NTP 4.3.16

4.3.16

NTP 4.3.17

4.3.17

NTP 4.3.18

4.3.18

NTP 4.3.19

4.3.19

NTP 4.3.20

4.3.20

NTP 4.3.21

4.3.21

NTP 4.3.22

4.3.22

NTP 4.3.23

4.3.23

NTP 4.3.24

4.3.24

NTP 4.3.25

4.3.25

NTP 4.3.26

4.3.26

NTP 4.3.27

4.3.27

NTP 4.3.28

4.3.28

NTP 4.3.29

4.3.29

NTP 4.3.30

4.3.30

NTP 4.3.31

4.3.31

NTP 4.3.32

4.3.32

NTP 4.3.33

4.3.33

NTP 4.3.34

4.3.34

NTP 4.3.35

4.3.35

NTP 4.3.36

4.3.36

NTP 4.3.37

4.3.37

NTP 4.3.38

4.3.38

NTP 4.3.39

4.3.39

NTP 4.3.40

4.3.40

NTP 4.3.41

4.3.41

NTP 4.3.42

4.3.42

NTP 4.3.43

4.3.43

NTP 4.3.44

4.3.44

NTP 4.3.45

4.3.45

NTP 4.3.46

4.3.46

NTP 4.3.47

4.3.47

NTP 4.3.48

4.3.48

NTP 4.3.49

4.3.49

NTP 4.3.50

4.3.50

NTP 4.3.51

4.3.51

NTP 4.3.52

4.3.52

NTP 4.3.53

4.3.53

NTP 4.3.54

4.3.54

NTP 4.3.55

4.3.55

NTP 4.3.56

4.3.56

NTP 4.3.57

4.3.57

NTP 4.3.58

4.3.58

NTP 4.3.59

4.3.59

NTP 4.3.60

4.3.60

NTP 4.3.61

4.3.61

NTP 4.3.62

4.3.62

NTP 4.3.63

4.3.63

NTP 4.3.64

4.3.64

NTP 4.3.65

4.3.65

NTP 4.3.66

4.3.66

NTP 4.3.67

4.3.67

NTP 4.3.68

4.3.68

NTP 4.3.69

4.3.69

NTP 4.3.70

4.3.70

NTP 4.3.71

4.3.71

NTP 4.3.72

4.3.72

NTP 4.3.73

4.3.73

NTP 4.3.74

4.3.74

NTP 4.3.75

4.3.75

NTP 4.3.76

4.3.76

NTP 4.3.77

4.3.77

NTP 4.3.78

4.3.78

NTP 4.3.79

4.3.79

NTP 4.3.80

4.3.80

NTP 4.3.81

4.3.81

NTP 4.3.82

4.3.82

NTP 4.3.83

4.3.83

NTP 4.3.84

4.3.84

NTP 4.3.85

4.3.85

NTP 4.3.86

4.3.86

NTP 4.3.87

4.3.87

NTP 4.3.88

4.3.88

NTP 4.3.89

4.3.89

SUSE Linux Enterprise Debuginfo 11 Service Pack 2

11

SUSE Linux Enterprise Debuginfo 11 Service Pack 3

11

SUSE Linux Enterprise Debuginfo 11 Service Pack 4

11

Novell SUSE OpenStack Cloud 5

5

openSUSE Leap 42.1

42.1

OpenSUSE 13.2

13.2

SUSE Linux Enterprise Desktop 12

12

SUSE Linux Enterprise Desktop 12 Service Pack 1

12

SUSE Linux Enterprise Server 10 Service Pack 4 Long Term Service Pack Support

10

SUSE Linux Enterprise Server 11 Service Pack 2 Long Term Service Pack Support

11

SUSE Linux Enterprise Server 11 Service Pack 4

11

SUSE Linux Enterprise Server 12 Service Pack 1

12

SUSE Linux Enterprise Server (SLES) 12

12

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.