Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-7183

Опубликовано: 08 мар. 2018
Источник: debian

Описание

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.8p11+dfsg-1package
ntpno-dsastretchpackage
ntpno-dsajessiepackage
ntpno-dsawheezypackage
ntpsecnot-affectedpackage

Примечания

  • http://www.kb.cert.org/vuls/id/961909

  • http://support.ntp.org/bin/view/Main/NtpBug3414

  • http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

CVSS3: 5
redhat
почти 8 лет назад

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

CVSS3: 9.8
nvd
почти 8 лет назад

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

CVSS3: 9.8
github
больше 3 лет назад

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

CVSS3: 7.3
fstec
почти 8 лет назад

Уязвимость функции decodearr программы мониторинга ntpq реализации протокола синхронизации времени NTP, позволяющая нарушителю выполнить произвольный код