First published: Wed Jun 20 2018(Updated: )
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | =4.2.8-p11 | |
ubuntu/ntp | <1:4.2.8 | 1:4.2.8 |
ubuntu/ntp | <1:4.2.6. | 1:4.2.6. |
ubuntu/ntp | <4.2.8 | 4.2.8 |
ubuntu/ntp | <1:4.2.8 | 1:4.2.8 |
debian/ntp | <=1:4.2.8p15+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12327 is a stack-based buffer overflow vulnerability in ntpq and ntpdc of NTP version 4.2.8p11.
CVE-2018-12327 has a severity rating of 9.8 out of 10, indicating it is critical.
The affected software includes NTP version 4.2.8p11 and some versions of the ntp package in Debian and Ubuntu.
An attacker can exploit CVE-2018-12327 by providing a long string as the argument for an IPv4 or IPv6 command-line parameter, which can lead to code execution or privilege escalation.
You can find more information about CVE-2018-12327 on the MITRE CVE website, a GitHub gist, and the Ubuntu security notices.