In October 2015, NTP.org released a security advisory [1] detailing issues regarding multiple DoS vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker gaining the ability to modify an NTP server's advertised time.
Airlock WAF is not affected.
Details:
The following vulnerabilities do not affect Airlock WAF because:
no action is required