{"id":68770,"date":"2017-02-02T16:06:59","date_gmt":"2017-02-03T00:06:59","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=68770"},"modified":"2025-05-27T20:20:16","modified_gmt":"2025-05-28T03:20:16","slug":"analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/","title":{"rendered":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service"},"content":{"rendered":"<p>The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation of this protocol. In the last couple of months, a number of vulnerabilities have been reported in NTPD. One is CVE-2016-9311, which can cause a crash leading to a denial of service. We have analyzed this vulnerability and provided detection for our customers. In this post we take a detailed look at this vulnerability.<\/p>\n<h2><strong>Finding the changes<\/strong><\/h2>\n<p>Examining the patch, we found that the function \u201creport_event\u201d in ntp_control.c holds the fix for this vulnerability. The patch diff tool gives us the following screen (taken from <a href=\"http:\/\/bugs.ntp.org\/attachment.cgi?id=1460&amp;action=diff\">http:\/\/bugs.ntp.org\/attachment.cgi?id=1460&amp;action=diff<\/a>):<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=68777\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68777\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\" alt=\"\" width=\"976\" height=\"689\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png 976w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1-300x212.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1-768x542.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1-708x500.png 708w\" sizes=\"auto, (max-width: 976px) 100vw, 976px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The left side of the preceding image shows the unpatched code, while right side has the patched code.<\/p>\n<p>In the vulnerable version of code there is one assert statement:<\/p>\n<p style=\"padding-left: 30px;\">INSIST(peer!=NULL)<\/p>\n<p>INSIST is defined in ntp_assert.h. If peer==NULL, then the assertion will fail and NTPD will crash.<\/p>\n<p>In the fixed version, we can see that the INSIST(peer!=NULL) statement is replaced by a simple \u201cif\u201d check:<\/p>\n<p style=\"padding-left: 30px;\">if ((err &amp; PEER_EVENT) &amp;&amp; !peer)<\/p>\n<p style=\"padding-left: 30px;\">return<\/p>\n<p>This if statement checks whether the value of \u201cpeer\u201d is null. If so, it will simply return and prevent a crash.<\/p>\n<h2><strong>Analyzing the root cause<\/strong><\/h2>\n<p>To trigger this vulnerability, program flow needs to reach the \u201creport_event\u201d function with a parameter such that the INSIST assertion check fails. (The variable \u201cpeer\u201d should be null.)<\/p>\n<p>When NTPD receives a packet, it goes to the function \u201creceive\u201d in ntp_proto.c. The \u201creceive\u201d function performs various checks on the received packet; one checks for valid or invalid crypto-negative acknowledgement (crypto-NAK) packets:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=68776\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68776\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-2.png\" alt=\"\" width=\"545\" height=\"231\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-2.png 545w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-2-300x127.png 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/a><\/p>\n<p>If NTPD receives an invalid NAK packet, it will call the vulnerable function \u201creport_event.\u201d In this vulnerable function, a check looks for the number of traps. If no traps are configured on NTPD, then the function will simply return and the vulnerable code path will not be taken.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=68775\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68775\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-3.png\" alt=\"\" width=\"258\" height=\"108\" \/><\/a><\/p>\n<p>This vulnerability can be exploited only if traps are enabled in NTPD. To check for invalid NAK packets, the function \u201cvalid_NAK\u201d is present in ntp_proto.c:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=68774\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68774\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-4.png\" alt=\"\" width=\"522\" height=\"673\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-4.png 522w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-4-233x300.png 233w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-4-388x500.png 388w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/a><\/p>\n<p>As we see in the preceding image, the following conditions will mark a packet as an invalid NAK:<\/p>\n<ul>\n<li>If mode is not MODE_SERVER and mode is not MODE_ACTIVE and mode is not MODE_PASSIVE.<\/li>\n<li>If keyid is not 0.<\/li>\n<li>If there is no peer or peer does not have a key.<\/li>\n<li>If the origin does not match.<\/li>\n<\/ul>\n<p>If the trap functionality is enabled on NTP, then sending an \u201cinvalid NAK\u201d packet with no peer present will trigger this vulnerability. We can confirm this using a debugger on vulnerable version. The following screen shows NTPD crashing because of this assertion failure:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=68773\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68773\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-5.png\" alt=\"\" width=\"729\" height=\"959\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-5.png 729w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-5-228x300.png 228w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-5-380x500.png 380w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/a><\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>This vulnerability can be exploited only on NTPD installations with traps configured to cause a denial of service; traps are not enabled by default. Authorization is not required to exploit this vulnerability.<\/p>\n<p>Apply the latest patches or use an up-to-date version of NTPD to guard against this vulnerability. Customers of McAfee Network Security Platform are protected from this vulnerability through signature ID 0x41b01100.<\/p>\n<h2><strong>References<\/strong><\/h2>\n<ul>\n<li><a href=\"http:\/\/support.ntp.org\/bin\/view\/Main\/NtpBug3119\">NTP Security Notice<\/a><\/li>\n<li><a href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2016-9311\">CVE-2016-9311 on NVD<\/a><\/li>\n<li><a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/633847\">CERT\/CC Vulnerability Note VU#633847<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an&#8230;<\/p>\n","protected":false},"author":612,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,18,4827],"coauthors":[2095],"class_list":["post-68770","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-network-security","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-03T00:06:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T03:20:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"976\" \/>\n\t<meta property=\"og:image:height\" content=\"689\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hardik Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hardik05\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hardik Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\"},\"author\":{\"name\":\"Hardik Shah\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\"},\"headline\":\"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service\",\"datePublished\":\"2017-02-03T00:06:59+00:00\",\"dateModified\":\"2025-05-28T03:20:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\"},\"wordCount\":558,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\",\"keywords\":[\"computer security\",\"network security\",\"vulnerability\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\",\"name\":\"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\",\"datePublished\":\"2017-02-03T00:06:59+00:00\",\"dateModified\":\"2025-05-28T03:20:16+00:00\",\"description\":\"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342\",\"name\":\"Hardik Shah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g\",\"caption\":\"Hardik Shah\"},\"description\":\"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/hardik05\/\",\"https:\/\/x.com\/hardik05\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog","description":"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog","og_description":"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-02-03T00:06:59+00:00","article_modified_time":"2025-05-28T03:20:16+00:00","og_image":[{"width":976,"height":689,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png","type":"image\/png"}],"author":"Hardik Shah","twitter_card":"summary_large_image","twitter_creator":"@hardik05","twitter_site":"@McAfee","twitter_misc":{"Written by":"Hardik Shah","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/"},"author":{"name":"Hardik Shah","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342"},"headline":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service","datePublished":"2017-02-03T00:06:59+00:00","dateModified":"2025-05-28T03:20:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/"},"wordCount":558,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png","keywords":["computer security","network security","vulnerability"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/","name":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png","datePublished":"2017-02-03T00:06:59+00:00","dateModified":"2025-05-28T03:20:16+00:00","description":"The network time protocol synchronizes time across various devices on a network. The network time protocol daemon (NTPD) is an open-source implementation","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/02\/20170202-NTPD-DoS-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/analyzing-cve-2016-9311-ntpd-vulnerability-can-lead-denial-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Analyzing CVE-2016-9311: NTPD Vulnerability Can Lead to Denial of Service"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/99cb905e9b4051dfea96a7752dea4342","name":"Hardik Shah","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b151596c8b1a8dc9b25ec3b19ccfd8c0","url":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b87a13b8b83a589e5494d7db597ad6a?s=96&d=mm&r=g","caption":"Hardik Shah"},"description":"Hardik Shah, a Senior Research Engineer in McAfee Labs, is an experienced security researcher and technology evangelist. He has extensive experience with exploits, malware analysis, and various IPS engines. Shah enjoys figuring out ways to protect customers from the latest threats. Prior to McAfee, he worked with the IPS research team at Symantec. You can follow him on twitter at @hardik05","sameAs":["https:\/\/www.linkedin.com\/in\/hardik05\/","https:\/\/x.com\/hardik05"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/hardik-shah\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/612"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=68770"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68770\/revisions"}],"predecessor-version":[{"id":214500,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/68770\/revisions\/214500"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=68770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=68770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=68770"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=68770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}