CWE
20
Advisory Published
Updated

CVE-2013-5211: Input Validation

First published: Thu Jan 02 2014(Updated: )

The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
SUSE Linux=11.4
NTP<4.2.7
NTP=4.2.7
NTP=4.2.7-p0
NTP=4.2.7-p1
NTP=4.2.7-p10
NTP=4.2.7-p11
NTP=4.2.7-p12
NTP=4.2.7-p13
NTP=4.2.7-p14
NTP=4.2.7-p15
NTP=4.2.7-p16
NTP=4.2.7-p17
NTP=4.2.7-p18
NTP=4.2.7-p19
NTP=4.2.7-p2
NTP=4.2.7-p20
NTP=4.2.7-p21
NTP=4.2.7-p22
NTP=4.2.7-p23
NTP=4.2.7-p24
NTP=4.2.7-p25
NTP=4.2.7-p3
NTP=4.2.7-p4
NTP=4.2.7-p5
NTP=4.2.7-p6
NTP=4.2.7-p7
NTP=4.2.7-p8
NTP=4.2.7-p9
Oracle Linux=6
Oracle Linux=7
NTP=4.2.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-5211?

    CVE-2013-5211 has a severity rating of medium due to its potential for denial of service attacks.

  • How do I fix CVE-2013-5211?

    To fix CVE-2013-5211, upgrade to NTP version 4.2.7p26 or later.

  • What kind of attack does CVE-2013-5211 enable?

    CVE-2013-5211 enables remote attackers to execute traffic amplification denial of service attacks.

  • Which systems are affected by CVE-2013-5211?

    CVE-2013-5211 affects NTP versions prior to 4.2.7p26 and certain versions of openSUSE and Oracle Linux.

  • Is CVE-2013-5211 actively exploited?

    Yes, CVE-2013-5211 was actively exploited in the wild starting in December 2013.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203