CVE-2009-3563

N/A Unknown
Published: December 09, 2009 Modified: April 23, 2026
View on NVD

Description

ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/568372
Source: cve@mitre.org
Patch US Government Resource
http://www.securityfocus.com/bid/37255
Source: cve@mitre.org
Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560074
Source: af854a3a-2127-422b-91ae-364da2661108
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
Source: af854a3a-2127-422b-91ae-364da2661108
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=130168580504508&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=136482797910018&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37629
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37922
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38764
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38794
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38832
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38834
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/39593
Source: af854a3a-2127-422b-91ae-364da2661108
http://security-tracker.debian.org/tracker/CVE-2009-3563
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1023298
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/css/P8/documents/100071808
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=isg1IZ68659
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=isg1IZ71047
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1948
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.kb.cert.org/vuls/id/568372
Source: af854a3a-2127-422b-91ae-364da2661108
Patch US Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7X7V6J
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/MAPG-7X7VD7
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/37255
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.vupen.com/english/advisories/2010/0510
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0528
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0993
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=531213
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1648.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1651.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://support.ntp.org/bugs/show_bug.cgi?id=1331
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.kb.cert.org/vuls/id/417980
Source: af854a3a-2127-422b-91ae-364da2661108

86 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
79.6%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

ntp