First published: Thu Jan 09 2020(Updated: )
It was discovered that ntpq and ntpdc incorrectly handled some arguments. An attacker could possibly use this issue to cause ntpq or ntpdc to crash, execute arbitrary code, or escalate to higher privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ntp | <1:4.2.8p4+dfsg-3ubuntu5.10 | 1:4.2.8p4+dfsg-3ubuntu5.10 |
=16.04 | ||
All of | ||
ubuntu/ntp | <1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1 | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1 |
=14.04 | ||
All of | ||
ubuntu/ntp | <1:4.2.6.p3+dfsg-1ubuntu3.13 | 1:4.2.6.p3+dfsg-1ubuntu3.13 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NTP vulnerability is USN-4229-1.
The NTP vulnerability affects NTP versions 4.2.8p4+dfsg-3ubuntu5.10, 4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1, and 4.2.6.p3+dfsg-1ubuntu3.13 on Ubuntu versions 16.04, 14.04, and 12.04 respectively.
The NTP vulnerability could allow an attacker to crash ntpq or ntpdc, execute arbitrary code, or escalate privileges.
To fix the NTP vulnerability, update the ntp package to version 1:4.2.8p4+dfsg-3ubuntu5.10 (for Ubuntu 16.04), 1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1 (for Ubuntu 14.04), or 1:4.2.6.p3+dfsg-1ubuntu3.13 (for Ubuntu 12.04).
You can find more information about the NTP vulnerability at the following references: [CVE-2018-12327](https://ubuntu.com/security/CVE-2018-12327), [USN-4229-2](https://ubuntu.com/security/notices/USN-4229-2), [Launchpad](https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p4+dfsg-3ubuntu5.10).