Show plain JSON{"acknowledgement": "This issue was discovered by Miroslav Lichv\u00e1r (Red Hat).", "affected_release": [{"advisory": "RHSA-2016:2583", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "ntp-0:4.2.6p5-25.el7", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2016-11-03T00:00:00Z"}], "bugzilla": {"description": "ntp: config command can be used to set the pidfile and drift file paths", "id": "1254547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1254547"}, "csaw": false, "cvss": {"cvss_base_score": "4.0", "cvss_scoring_vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "status": "verified"}, "cwe": "CWE-73", "details": ["It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals)."], "mitigation": {"lang": "en:us", "value": "Disable remote runtime configuration with ntpq or ntpdc. In the default NTP configuration on Red Hat Enterprise Linux, runtime configuration with ntpq or ntpdc is limited to localhost."}, "name": "CVE-2015-5196", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Will not fix", "package_name": "ntp", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Affected", "package_name": "ntp", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2015-08-25T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2015-5196\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-5196"], "threat_severity": "Low"}