vendor:
NTP
by:
Fakhri Zulkifli
9.8
CVSS
CRITICAL
Buffer Overflow
119
CWE
Product Name: NTP
Affected Version From: 4.2.8p11
Affected Version To: 4.2.8p11
Patch Exists: YES
Related CWE: CVE-2018-12327
CPE: a:ntp:ntp:4.2.8p11
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/ntp-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/ibm-aix-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-12327/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-12327/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=119791, https://www.infosecmatter.com/nessus-plugin-library/?id=118357, https://www.infosecmatter.com/nessus-plugin-library/?id=118352, https://www.infosecmatter.com/nessus-plugin-library/?id=112223, https://www.infosecmatter.com/nessus-plugin-library/?id=119823, https://www.infosecmatter.com/nessus-plugin-library/?id=132434, https://www.infosecmatter.com/nessus-plugin-library/?id=119796, https://www.infosecmatter.com/nessus-plugin-library/?id=144545, https://www.infosecmatter.com/nessus-plugin-library/?id=128347, https://www.infosecmatter.com/nessus-plugin-library/?id=111968
Platforms Tested: 4.2.8p11
2018
ntpq and ntpdc 4.2.8p11 Local Buffer Overflow
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows a local attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter.
Mitigation:
Upgrade to the latest version of NTP.