Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7182

Опубликовано: 06 мар. 2018
Источник: debian

Описание

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p11+dfsg-1package
ntppostponedstretchpackage
ntppostponedjessiepackage
ntpnot-affectedwheezypackage
ntpsecfixed1.0.0+dfsg1-5package

Примечания

  • http://www.kb.cert.org/vuls/id/961909

  • http://support.ntp.org/bin/view/Main/NtpBug3412

  • http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S

  • Fixed by (ntpsec): https://gitlab.com/NTPsec/ntpsec/commit/6d6aa6da0fe685011f5a9633c3618409af8349d7

  • https://lists.ntpsec.org/pipermail/devel/2018-March/006008.html

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

CVSS3: 5.3
redhat
почти 8 лет назад

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

CVSS3: 7.5
nvd
почти 8 лет назад

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

CVSS3: 7.5
github
больше 3 лет назад

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

CVSS3: 5.3
fstec
почти 8 лет назад

Уязвимость метода ctl_getitem программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании