ntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://archive.ntp.org|ntp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Write

[,4.2.8p16)
  • L
Out-of-bounds Write

[,4.2.8p16)
  • L
Out-of-bounds Write

[4.1.2,4.2.8p16)
  • L
Out-of-bounds Write

[,4.2.8p16)
  • L
Out-of-bounds Write

[,4.2.8p16)
  • M
Out-of-Bounds

[,4.3.0)
  • M
Information Exposure

[,4.2.7]
  • H
Out-of-Bounds

[,4.2.8p10)[4.3.0,4.3.94)
  • M
Improper Input Validation

[4.2.0,4.2.8)
  • H
Use After Free

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Input Validation

[,4.3.0)
  • M
Improper Authentication

[,4.2.4p5)
  • M
Improper Input Validation

[,4.3.0)
  • H
CVE-2014-9293

[,4.2.8)
  • H
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Access Control

[,4.3.0)
  • H
Improper Input Validation

[,4.2.8)[4.3.0,4.3.100)
  • H
Incorrect Type Conversion or Cast

[,4.2.8)
  • M
Improper Input Validation

[0,4.2.8p14)
  • H
Out-of-Bounds

[,4.2.8)
  • H
Out-of-Bounds

[,4.2.8p10)[4.3.0,4.3.94)
  • M
NULL Pointer Dereference

[0,4.2.8p6)
  • H
Insecure Randomness

[,4.2.8p2)[4.3.0,4.3.12)
  • M
Out-of-Bounds

[,4.2.8p10)[4.3.0,4.3.94)
  • H
Out-of-Bounds

[,4.2.8p10)[4.3.0,4.3.94)
  • M
Improper Input Validation

[,4.2.8p10)[4.3.0,4.3.94)
  • C
Out-of-bounds Write

[0,4.2.8p11)
  • M
Out-of-Bounds

[,4.3.0)
  • M
Denial of Service (DoS)

[,4.2.4p0)
  • H
CVE-2014-9294

[,4.2.8)
  • H
Improper Authentication

[4.2.0,4.2.8)[4.3.0,4.3.90)
  • M
Out-of-Bounds

[,4.2.5p0)
  • H
Improper Data Handling

[,4.3.0)
  • C
Improper Authentication

[4.2.6,4.2.8)[4.3.0,4.3.77)
  • M
Improper Access Control

[,4.3.0)
  • M
Improper Input Validation

[0,4.2.7p26)
  • H
Memory Leak

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Code

[,4.1.2)
  • H
Denial of Service (DoS)

[0,4.2.8p11)
  • M
Memory Leak

[4.3.97,4.3.101)
  • H
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Input Validation

[,4.2.8p10)[4.3.0,4.3.94)
  • M
Out-of-Bounds

[,4.2.4p7)[4.2.0,4.2.5p74)
  • L
Out-of-bounds Write

[4.0.0,4.2.8p12)[4.3.0,4.2.8p16)
  • M
Race Condition

[4.2.0,4.2.8)[4.3.0,4.3.93)
  • H
Resource Management Errors

[,4.3.0)
  • H
Denial of Service (DoS)

[4.2.6,4.2.8)
  • H
Integer Overflow or Wraparound

[0,4.2.8p4)
  • H
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • H
Improper Input Validation

[,4.2.8)
  • M
Denial of Service (DoS)

[0,ntp-4.2.8p9)
  • H
Out-of-bounds Write

[0,4.2.8p10)
  • H
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Input Validation

[,4.3.0)
  • H
Remote Code Execution (RCE)

[,4.2.8p10)[4.3.0,4.3.94)
  • M
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Integer Overflow or Wraparound

[,4.0)
  • M
Directory Traversal

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Improper Input Validation

[0,ntp-4.2.8p9)
  • H
Improper Input Validation

[,4.2.8)
  • H
Improper Authentication

[4.2.0,4.2.8)[4.3.0,4.3.93)
  • M
Access Restriction Bypass

[4.2.0,4.2.8)[4.3.0,4.3.92)
  • H
NULL Pointer Dereference

[0,ntp-4.2.8p7)
  • H
Buffer Overflow

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Denial of Service (DoS)

[4.2.0,4.2.8)[4.3.0,4.3.93)
  • M
Security Features

[,4.2.8)[4.3.0,4.3.90)
  • H
NULL Pointer Dereference

[,4.2.8)
  • M
Improper Data Handling

[0,4.2.8p7)
  • M
Denial of Service (DoS)

[0,4.2.8p9)
  • H
Out-of-Bounds

[,4.2.8)[4.3.0,4.3.94)
  • H
Improper Data Handling

[0,4.2.8p7)
  • H
Time and State

[,4.3.0)
  • M
Denial of Service (DoS)

[,4.3.0)
  • M
Denial of Service (DoS)

[,4.3.0)
  • H
Denial of Service (DoS)

[4.2.6,4.2.8)[4.3.0,4.3.94)
  • M
Improper Input Validation

[,4.3.0)
  • M
NULL Pointer Dereference

[,4.3.0)
  • M
Incorrect Calculation

[,4.3.0)
  • M
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • H
Denial of Service (DoS)

[,4.2.8)[4.3.98,4.3.100)
  • M
Out-of-bounds Read

[0,4.2.8p7)
  • C
Improper Input Validation

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • L
Source Code

[,4.3.0)
  • H
Improper Input Validation

[4.3.0,4.3.94)
  • M
Denial of Service (DoS)

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • C
Buffer Overflow

[4.2.0,4.2.8)[4.3.0,4.3.77)
  • M
Code

[,4.2.8)
  • M
Improper Input Validation

[,4.3.0)
  • M
Improper Input Validation

[4.2.0,4.2.8)
  • M
Information Exposure

[0,4.2.8p7)
  • L
Code

[,4.1.2)
  • H
Race Condition

[4.2.0,4.2.8)[4.3.0,4.3.93)
  • M
Security Features

[,4.3.0)
  • M
Improper Input Validation

[0,4.2.8p10)
  • H
Denial of Service (DoS)

[,4.3.0)
  • H
Out-of-bounds Read

[0,4.2.8p11)
  • L
Security Features

[0,4.2.8p7)