<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ntp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:1047-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-04-18T14:06:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-04-18T14:06:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-04-18T14:06:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ntp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This ntp update to version 4.2.8p10 fixes serveral issues.

This updated enables leap smearing. See
/usr/share/doc/packages/ntp/README.leapsmear for details.

Security issues fixed (bsc#1030050):

- CVE-2017-6464: Denial of Service via Malformed Config
- CVE-2017-6462: Buffer Overflow in DPTS Clock
- CVE-2017-6463: Authenticated DoS via Malicious Config Option
- CVE-2017-6458: Potential Overflows in ctl_put() functions
- CVE-2017-6451: Improper use of snprintf() in mx4200_send()
- CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
- CVE-2016-9042: 0rigin (zero origin) DoS.
- ntpq_stripquotes() returns incorrect Value
- ereallocarray()/eallocarray() underused
- Copious amounts of Unused Code
- Off-by-one in Oncore GPS Receiver
- Makefile does not enforce Security Flags

Bugfixes:

- Remove spurious log messages (bsc#1014172).
- clang scan-build findings
- Support for openssl-1.1.0 without compatibility modes
- Bugfix 3072 breaks multicastclient
- forking async worker: interrupted pipe I/O
- (...) time_pps_create: Exec format error
- Incorrect Logic for Peer Event Limiting
- Change the process name of forked DNS worker
- Trap Configuration Fail
- Nothing happens if minsane &lt; maxclock &lt; minclock
- allow -4/-6 on restrict line with mask
- out-of-bound pointers in ctl_putsys and decode_bitflags
- Move ntp-kod to /var/lib/ntp, because /var/db is not a standard directory and causes problems for
  transactional updates.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-2017-612,SUSE-SLE-SERVER-12-2017-612</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      <Description>Link for SUSE-SU-2017:1047-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:1047-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1014172</URL>
      <Description>SUSE Bug 1014172</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1030050</URL>
      <Description>SUSE Bug 1030050</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9042/</URL>
      <Description>SUSE CVE CVE-2016-9042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6451/</URL>
      <Description>SUSE CVE CVE-2017-6451 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6458/</URL>
      <Description>SUSE CVE CVE-2017-6458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6460/</URL>
      <Description>SUSE CVE CVE-2017-6460 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6462/</URL>
      <Description>SUSE CVE CVE-2017-6462 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6463/</URL>
      <Description>SUSE CVE CVE-2017-6463 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6464/</URL>
      <Description>SUSE CVE CVE-2017-6464 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ntp-4.2.8p10-46.23.1">
      <FullProductName ProductID="ntp-4.2.8p10-46.23.1">ntp-4.2.8p10-46.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-doc-4.2.8p10-46.23.1">
      <FullProductName ProductID="ntp-doc-4.2.8p10-46.23.1">ntp-doc-4.2.8p10-46.23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ntp-4.2.8p10-46.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1">ntp-4.2.8p10-46.23.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-doc-4.2.8p10-46.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1">ntp-doc-4.2.8p10-46.23.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-4.2.8p10-46.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1">ntp-4.2.8p10-46.23.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-doc-4.2.8p10-46.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1">ntp-doc-4.2.8p10-46.23.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2016-9042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9042.html</URL>
        <Description>CVE-2016-9042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.</Note>
    </Notes>
    <CVE>CVE-2017-6451</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6451.html</URL>
        <Description>CVE-2017-6451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.</Note>
    </Notes>
    <CVE>CVE-2017-6458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6458.html</URL>
        <Description>CVE-2017-6458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.</Note>
    </Notes>
    <CVE>CVE-2017-6460</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6460.html</URL>
        <Description>CVE-2017-6460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.</Note>
    </Notes>
    <CVE>CVE-2017-6462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6462.html</URL>
        <Description>CVE-2017-6462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.</Note>
    </Notes>
    <CVE>CVE-2017-6463</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6463.html</URL>
        <Description>CVE-2017-6463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.</Note>
    </Notes>
    <CVE>CVE-2017-6464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:ntp-doc-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p10-46.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p10-46.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20171047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6464.html</URL>
        <Description>CVE-2017-6464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
