First published: Tue Mar 06 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | =4.2.8-p10 | |
NTP ntp | =4.2.8-p6 | |
NTP ntp | =4.2.8-p7 | |
NTP ntp | =4.2.8-p8 | |
NTP ntp | =4.2.8-p9 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Element Software | ||
debian/ntp | 1:4.2.8p15+dfsg-1 | |
debian/ntpsec | 1.2.0+dfsg1-4 1.2.2+dfsg1-1+deb12u1 1.2.3+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7182 is a vulnerability in ntpd that allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet.
CVE-2018-7182 affects ntpd versions 4.2.8p6 through 4.2.8p10.
CVE-2018-7182 has a severity rating of high (7.5).
To fix the CVE-2018-7182 vulnerability, update your ntpd instance to version 4.2.8p11 or higher.
You can find more information about CVE-2018-7182 at the following references: [1] [2] [3].