{"id":"CVE-2015-7848","details":"An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.","modified":"2026-01-27T04:15:09.606534Z","published":"2017-01-06T21:59:00Z","withdrawn":"2026-01-27T04:15:09.606534Z","related":["SUSE-SU-2015:2058-1","SUSE-SU-2016:1247-1","SUSE-SU-2016:1311-1","openSUSE-SU-2024:10181-1"],"references":[{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2015-0052/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201607-15"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171004-0001/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/77275"},{"type":"WEB","url":"http://www.securitytracker.com/id/1033951"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}