First published: Thu Mar 08 2018(Updated: )
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | =4.2.8-p10 | |
NTP ntp | =4.2.8-p6 | |
NTP ntp | =4.2.8-p7 | |
NTP ntp | =4.2.8-p8 | |
NTP ntp | =4.2.8-p9 | |
FreeBSD FreeBSD | =10.3 | |
FreeBSD FreeBSD | =10.4 | |
FreeBSD FreeBSD | =11.1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Netapp Element Software | ||
debian/ntp | 1:4.2.8p15+dfsg-1 | |
debian/ntpsec | 1.2.0+dfsg1-4 1.2.2+dfsg1-1+deb12u1 1.2.3+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7183 is a buffer overflow vulnerability in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10.
CVE-2018-7183 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
CVE-2018-7183 has a severity rating of 9.8 (Critical).
Ntp 4.2.8p6 through 4.2.8p10, Freebsd 10.3 through 10.4, Freebsd 11.1, and various versions of Ubuntu Linux and Netapp Element Software are affected by CVE-2018-7183.
To fix CVE-2018-7183, update to at least ntp 4.2.8p12+dfsg-4, ntpsec 1.2.2+dfsg1-2, or the appropriate patched version based on your software distribution.