ntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ntp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Resource Exhaustion

<1:4.2.6.p5+dfsg-7+deb8u3
  • M
Information Exposure

*
  • M
Directory Traversal

<1:4.2.6.p5+dfsg-7+deb8u1
  • C
Out-of-bounds Write

*
  • C
Out-of-bounds Write

*
  • H
CVE-2018-7185

*
  • H
CVE-2018-7184

*
  • M
CVE-2018-7170

*
  • H
Out-of-bounds Read

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Insufficient Entropy

<1:4.2.6.p5+dfsg-7
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Missing Release of Resource after Effective Lifetime

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • C
Improper Authentication

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • C
Improper Input Validation

*
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Time and State

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Incorrect Type Conversion or Cast

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Access Restriction Bypass

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • M
Security Features

*
  • M
Improper Access Control

*
  • M
Improper Access Control

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • H
Resource Exhaustion

<1:4.2.6.p5+dfsg-7+deb8u2
  • H
Improper Data Handling

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
CVE-2015-8158

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Security Features

*
  • M
Out-of-bounds Read

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
NULL Pointer Dereference

<1:4.2.6.p5+dfsg-7+deb8u2
  • L
Source Code

*
  • M
NULL Pointer Dereference

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

<1:4.2.6.p5+dfsg-7+deb8u2
  • H
Improper Data Handling

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Data Handling

*
  • H
Race Condition

*
  • M
Race Condition

*
  • H
Improper Authentication

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-5
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-4
  • L
Code

<1:4.2.6.p5+dfsg-6
  • M
Code

<1:4.2.6.p5+dfsg-6
  • H
CVE-2014-9293

<1:4.2.6.p5+dfsg-3.2
  • H
Out-of-Bounds

<1:4.2.6.p5+dfsg-3.2
  • M
Code

<1:4.2.6.p5+dfsg-3.2
  • H
CVE-2014-9294

<1:4.2.6.p5+dfsg-3.2
  • M
Improper Input Validation

*
  • M
CVE-2009-3563

<1:4.2.4p8+dfsg-1
  • M
Out-of-Bounds

<1:4.2.4p6+dfsg-2
  • M
Out-of-Bounds

<1:4.2.4p6+dfsg-2
  • M
Improper Authentication

<1:4.2.4p4+dfsg-8
  • M
CVE-2005-2496

<1:4.2.0a+stable-2sarge1
  • M
Integer Overflow or Wraparound

<4.0