vulnerability
NTP: Unspecified Security Vulnerability (CVE-2018-7185)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Mar 6, 2018 | Feb 23, 2023 | Mar 1, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Mar 6, 2018
Added
Feb 23, 2023
Modified
Mar 1, 2023
Description
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
Solution
ntp-upgrade-4_2_8
References
- BID-103339
- CVE-2018-7185
- https://attackerkb.com/topics/CVE-2018-7185
- URL-http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- URL-http://support.ntp.org/bin/view/Main/NtpBug3454
- URL-http://www.securityfocus.com/archive/1/541824/100/0/threaded
- URL-http://www.securityfocus.com/bid/103339
- URL-https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
- URL-https://security.gentoo.org/glsa/201805-12
- URL-https://security.netapp.com/advisory/ntap-20180626-0001/
- URL-https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- URL-https://usn.ubuntu.com/3707-1/
- URL-https://usn.ubuntu.com/3707-2/
- URL-https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- URL-https://www.synology.com/support/security/Synology_SA_18_13

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.