{
  "threat_severity" : "Low",
  "public_date" : "2016-04-26T00:00:00Z",
  "bugzilla" : {
    "description" : "ntp: out-of-bounds references on crafted packet",
    "id" : "1331468",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1331468"
  },
  "cvss" : {
    "cvss_base_score" : "2.1",
    "cvss_scoring_vector" : "AV:N/AC:H/Au:S/C:N/I:N/A:P",
    "status" : "verified"
  },
  "details" : [ "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-05-31T00:00:00Z",
    "advisory" : "RHSA-2016:1141",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "ntp-0:4.2.6p5-10.el6.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2016-08-03T00:00:00Z",
    "advisory" : "RHSA-2016:1552",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "ntp-0:4.2.6p5-5.el6_7.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-05-31T00:00:00Z",
    "advisory" : "RHSA-2016:1141",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "ntp-0:4.2.6p5-22.el7_2.2"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "ntp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-2518\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-2518\nhttp://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" ],
  "name" : "CVE-2016-2518",
  "csaw" : false
}