Movatterモバイル変換


[0]ホーム

URL:


You are viewing this page in an unauthorized frame window.

This is a potential security issue, you are being redirected tohttps://nvd.nist.gov

U.S. flag  An official website of the United States government
Dot gov

Official websites use .gov
A.gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
Alock (Dot gov) orhttps:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • VulnerabilitiesExpand or Collapse
  • Vulnerability MetricsExpand or Collapse
  • ProductsExpand or Collapse

    CPE Dictionary

    CPE Search

    CPE Statistics

    SWID

  • DevelopersExpand or Collapse

    Start Here

    Request an API Key

    Vulnerabilities

    Products

    Data Sources

    Terms of Use

  • Contact NVD
  • Other SitesExpand or Collapse

    Checklist (NCP) Repository

    Configurations (CCE)

    800-53 Controls

    SCAPValidated Tools

    SCAP

    USGCB

  • SearchExpand or Collapse

    Vulnerability Search

    CPE Search

  • Information Technology Laboratory

    National Vulnerability Database

    National Vulnerability Database

    NVD

    National Vulnerability Database
    1. Vulnerabilities
    AddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReferenceAddedReference

    CVE-2015-8140 Detail

    Modified

    This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.

    Description

    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.


    Metrics

    NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
    CVSS 4.0 Severity and Vector Strings:

    NIST CVSS score
    NIST: NVD
    NVD assessment not yet provided.
    CVSS 3.x Severity and Vector Strings:

    NIST CVSS score
    NIST: NVD
    BaseScore: 4.8 MEDIUM
    Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
    CVSS 2.0 Severity and Vector Strings:

    National Institute of Standards and Technology
    NIST: NVD
    BaseScore: 5.8 MEDIUM
    Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:P)

    References to Advisories, Solutions, and Tools

    By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page tonvd@nist.gov.

    HyperlinkResource
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlThird Party Advisory 
    http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.htmlThird Party Advisory 
    http://support.ntp.org/bin/view/Main/NtpBug2947Vendor Advisory 
    http://support.ntp.org/bin/view/Main/NtpBug2947Vendor Advisory 
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdThird Party Advisory 
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpdThird Party Advisory 
    http://www.securitytracker.com/id/1034782Third Party Advisory VDB Entry 
    http://www.securitytracker.com/id/1034782Third Party Advisory VDB Entry 
    https://bto.bluecoat.com/security-advisory/sa113Third Party Advisory 
    https://bto.bluecoat.com/security-advisory/sa113Third Party Advisory 
    https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
    https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc
    https://security.gentoo.org/glsa/201607-15Third Party Advisory 
    https://security.gentoo.org/glsa/201607-15Third Party Advisory 
    https://security.netapp.com/advisory/ntap-20200204-0003/
    https://security.netapp.com/advisory/ntap-20200204-0003/
    https://www.kb.cert.org/vuls/id/718152Third Party Advisory US Government Resource 
    https://www.kb.cert.org/vuls/id/718152Third Party Advisory US Government Resource 

    Weakness Enumeration

    CWE-IDCWE NameSource
    CWE-284Improper Access Controlcwe source acceptance levelNIST  

    Known Affected Software ConfigurationsSwitch to CPE 2.2

    CPEs loading, please wait.

    Denotes Vulnerable Software
    Are we missing a CPE here? Please let us know.

    Change History

    6 change records foundshow changes

    CVE Modified by CVE11/20/2024 9:38:03 PM

    ActionTypeOld ValueNew Value
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html


    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html


    http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html


    http://support.ntp.org/bin/view/Main/NtpBug2947


    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd


    http://www.securitytracker.com/id/1034782


    https://bto.bluecoat.com/security-advisory/sa113


    https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc


    https://security.gentoo.org/glsa/201607-15


    https://security.netapp.com/advisory/ntap-20200204-0003/


    https://www.kb.cert.org/vuls/id/718152


    CVE Modified by MITRE5/13/2024 11:43:16 PM

    ActionTypeOld ValueNew Value

    CVE Modified by MITRE2/04/2020 7:15:13 AM

    ActionTypeOld ValueNew ValueAddedReference
    https://security.netapp.com/advisory/ntap-20200204-0003/ [No Types Assigned]


    CVE Modified by MITRE11/20/2017 9:29:01 PM

    ActionTypeOld ValueNew ValueAddedReference
    https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc [No Types Assigned]


    Reanalysis by NIST2/08/2017 10:37:31 AM

    ActionTypeOld ValueNew ValueChangedCVSS V3
    AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N


    AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L


    ChangedCVSS V2
    (AV:N/AC:L/Au:N/C:P/I:P/A:P)


    (AV:N/AC:M/Au:N/C:N/I:P/A:P)


    Initial Analysis by NIST2/07/2017 9:48:04 AM

    ActionTypeOld ValueNew ValueAddedCVSS V3
    AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N


    AddedCVSS V2
    (AV:N/AC:L/Au:N/C:P/I:P/A:P)


    AddedCWE
    CWE-284


    AddedCPE Configuration
    OR     *cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:* (and previous)


    ChangedReference Type
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html No Types Assigned


    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html Third Party Advisory


    ChangedReference Type
    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html No Types Assigned


    http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html Third Party Advisory


    ChangedReference Type
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html No Types Assigned


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html Third Party Advisory


    ChangedReference Type
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html No Types Assigned


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html Third Party Advisory


    ChangedReference Type
    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html No Types Assigned


    http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html Third Party Advisory


    ChangedReference Type
    http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html No Types Assigned


    http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html Third Party Advisory


    ChangedReference Type
    http://support.ntp.org/bin/view/Main/NtpBug2947 No Types Assigned


    http://support.ntp.org/bin/view/Main/NtpBug2947 Vendor Advisory


    ChangedReference Type
    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd No Types Assigned


    http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd Third Party Advisory


    ChangedReference Type
    http://www.securitytracker.com/id/1034782 No Types Assigned


    http://www.securitytracker.com/id/1034782 Third Party Advisory, VDB Entry


    ChangedReference Type
    https://bto.bluecoat.com/security-advisory/sa113 No Types Assigned


    https://bto.bluecoat.com/security-advisory/sa113 Third Party Advisory


    ChangedReference Type
    https://security.gentoo.org/glsa/201607-15 No Types Assigned


    https://security.gentoo.org/glsa/201607-15 Third Party Advisory


    ChangedReference Type
    https://www.kb.cert.org/vuls/id/718152 No Types Assigned


    https://www.kb.cert.org/vuls/id/718152 Third Party Advisory, US Government Resource


    Quick Info

    CVE Dictionary Entry:
    CVE-2015-8140
    NVD Published Date:
    01/30/2017
    NVD Last Modified:
    11/20/2024
    Source:
    MITRE

    [8]ページ先頭

    ©2009-2025 Movatter.jp