NTP.ntpd.Oversize.UDP.Packets.Handling.DoS

description-logoDescription

This indicates an attack attempt to exploit a Denial of Service Vulnerability in Windows port of Network Time Foundation's NTP Daemon.
The vulnerability is due to an improper validation when a vulnerable application parses a crafted query packet. A remote attacker could exploit this to crash vulnerable systems, via a crafted request.

affected-products-logoAffected Products

ntp.org NTP prior to 4.2.8p9

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://support.ntp.org/bin/view/Main/NtpBug3110

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2024-07-11 28.825
Modified
Name:NTP.
Org.
getEndptFromIoCtx.
DoS:NTP.
ntpd.
Oversize.
UDP.
Packets.
Handling.
DoS
2019-06-10 14.629
Modified
Severity:medium:high