First published: Thu Jan 02 2014(Updated: )
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11.4 | |
NTP | <4.2.7 | |
NTP | =4.2.7 | |
NTP | =4.2.7-p0 | |
NTP | =4.2.7-p1 | |
NTP | =4.2.7-p10 | |
NTP | =4.2.7-p11 | |
NTP | =4.2.7-p12 | |
NTP | =4.2.7-p13 | |
NTP | =4.2.7-p14 | |
NTP | =4.2.7-p15 | |
NTP | =4.2.7-p16 | |
NTP | =4.2.7-p17 | |
NTP | =4.2.7-p18 | |
NTP | =4.2.7-p19 | |
NTP | =4.2.7-p2 | |
NTP | =4.2.7-p20 | |
NTP | =4.2.7-p21 | |
NTP | =4.2.7-p22 | |
NTP | =4.2.7-p23 | |
NTP | =4.2.7-p24 | |
NTP | =4.2.7-p25 | |
NTP | =4.2.7-p3 | |
NTP | =4.2.7-p4 | |
NTP | =4.2.7-p5 | |
NTP | =4.2.7-p6 | |
NTP | =4.2.7-p7 | |
NTP | =4.2.7-p8 | |
NTP | =4.2.7-p9 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
NTP | =4.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5211 has a severity rating of medium due to its potential for denial of service attacks.
To fix CVE-2013-5211, upgrade to NTP version 4.2.7p26 or later.
CVE-2013-5211 enables remote attackers to execute traffic amplification denial of service attacks.
CVE-2013-5211 affects NTP versions prior to 4.2.7p26 and certain versions of openSUSE and Oracle Linux.
Yes, CVE-2013-5211 was actively exploited in the wild starting in December 2013.