vulnerability
NTP: Out-of-bounds Write (CVE-2018-12327)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jun 20, 2018 | Feb 23, 2023 | Mar 1, 2023 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 20, 2018
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
Solution
ntp-upgrade-latest
References
- BID-104517
- CVE-2018-12327
- https://attackerkb.com/topics/CVE-2018-12327
- REDHAT-RHSA-2018:3853
- REDHAT-RHSA-2018:3854
- REDHAT-RHSA-2019:2077
- URL-http://www.securityfocus.com/bid/104517
- URL-https://access.redhat.com/errata/RHSA-2018:3853
- URL-https://access.redhat.com/errata/RHSA-2018:3854
- URL-https://access.redhat.com/errata/RHSA-2019:2077
- URL-https://gist.github.com/fakhrizulkifli/9b58ed8e0354e8deee50b0eebd1c011f
- URL-https://security.gentoo.org/glsa/201903-15
- URL-https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- URL-https://usn.ubuntu.com/4229-1/
- URL-https://www.exploit-db.com/exploits/44909/

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.