CVE-2005-2496 Affecting ntp package, versions <1:4.2.0a+stable-2sarge1
Threat Intelligence
EPSS
0.07% (31st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NTP-523583
- published 2 Sep 2005
- disclosed 2 Sep 2005
Introduced: 2 Sep 2005
CVE-2005-2496 Open this link in a new tabHow to fix?
Upgrade Debian:11 ntp to version 1:4.2.0a+stable-2sarge1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ntp package and not the ntp package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
References
- http://www.debian.org/security/2005/dsa-801
- https://security-tracker.debian.org/tracker/CVE-2005-2496
- http://securitytracker.com/id?1016679
- http://www.securityspace.com/smysecure/catid.html?id=55155
- http://www.vupen.com/english/advisories/2005/1561
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9669
- http://secunia.com/advisories/16602
- http://secunia.com/advisories/21464
- http://www.securityfocus.com/bid/14673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22035
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:156
- http://www.redhat.com/support/errata/RHSA-2006-0393.html
- http://www.osvdb.org/19055
CVSS Scores
version 3.1