ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
Published 2009-12-09 18:30:00
Updated 2017-09-19 01:29:41
Source MITRE
View at NVD,   CVE.org
Vulnerability category: Denial of service

Products affected by CVE-2009-3563

Exploit prediction scoring system (EPSS) score for CVE-2009-3563

96.52%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2009-3563

  • NTP.org ntpd Reserved Mode Denial of Service
    Disclosure Date: 2009-10-04
    First seen: 2020-04-26
    auxiliary/dos/ntp/ntpd_reserved_dos
    This module exploits a denial of service vulnerability within the NTP (network time protocol) demon. By sending a single packet to a vulnerable ntpd server (Victim A), spoofed from the IP address of another vulnerable ntpd server (Victim B), both victims will

CVSS scores for CVE-2009-3563

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
6.4
MEDIUM AV:N/AC:L/Au:N/C:N/I:P/A:P
10.0
4.9
NIST

References for CVE-2009-3563

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!