5
CVSSv2

CVE-2013-5211

Published: 02/01/2014 Updated: 01/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 508
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The monlist feature in ntp_request.c in ntpd in NTP prior to 4.2.7p26 allows remote malicious users to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensuse opensuse 11.4

ntp ntp 4.2.7

ntp ntp

oracle linux 6

oracle linux 7

Vendor Advisories

Debian Bug report logs - #733940 ntp: CVE-2013-5211 Package: ntp; Maintainer for ntp is Debian NTP Team <ntp@packagesdebianorg>; Source for ntp is src:ntp (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 2 Jan 2014 13:15:02 UTC Severity: important Tags: security Fixed in version ...
The monlist feature in ntp_requestc in ntpd in NTP before 427p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013 (CVE-2013-5211) ...

Exploits

/* * Exploit Title: CVE-2013-5211 PoC - NTP DDoS amplification * Date: 28/04/2014 * Code Author: Danilo PC - <DaNotKnow@gmailcom> * CVE : CVE-2013-5211 */ /* I coded this program to help other to understand how an DDoS attack amplified by NTP servers works (CVE-2013-5211) * I took of the code that generates a DDoS, so this code only se ...
NTP distributed denial of service amplification tool that uses "get monlist" ...
NTP ntpd monlist query reflection denial of service exploit ...

Github Repositories

PoC for distributed NTP reflection DoS (CVE-2013-5211)

ntpdos PoC for distributed NTP reflection DoS (CVE-2013-5211) Usage $ /ntpdos -H --==[ ntpdos by sepehrdad ]==-- usage: ntpdos -t <addr> -s <addr> [options] | [misc] options: -t <addr> - target ip address -T <file> - list of target ip addresses -s <addr> - ntp server ip address -S &am

Tấn công từ chối dịch vụ Sơ lược về DoS Tấn công từ chối dịch vụ (Denial of Service hay Dos) là kiểu tấn công làm quá tải tài nguyên hệ thống, khiến cho hệ thống chậm đi đáng kể so với người dùng bình thường hoặc khiến hệ thống không th

CVE-2013-5211 PoC Network Time Protocol Daemon (ntpd) monlist Command Enabled DoS This Python script is used to detect CVE-2013-5211, a vulnerability found in NTP (Network Time Protocol) servers Using the ntpd monlist command, this vulnerability could allow an attacker to send a series of UDP packets to the server, consuming the server's resources The script sends a UDP

说明 本文档以3台centos7服务器为示例,三台服务器的基本信息为 主机名 IP swarm节点属性 ddc1 19216835101 manager ddc2 19216835102 manager ddc3 19216835103 manager 操作系统要求:Centos72 准备工作 linux间时钟同步 下载网盘中的文件:ntptargz 上传至每台服务器,解压缩 tar -zxvf ntptargz

CVE-2013-5211 PoC Network Time Protocol Daemon (ntpd) monlist Command Enabled DoS This Python script is used to detect CVE-2013-5211, a vulnerability found in NTP (Network Time Protocol) servers Using the ntpd monlist command, this vulnerability could allow an attacker to send a series of UDP packets to the server, consuming the server's resources The script sends a UDP

Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.

ntpscanner Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability

NTP monlist scanner CVE-2013-5211

ntpscanner NTP monlist scanner CVE-2013-5211 This code is for educational and research purposes, do not use it for malicious purposes

This module is an example profile to manage RHEL system configurations that comply with various regulations such as STIG, PCI, HIPAA, and more

About this Module This module is an example of how to use the System Integrity Monitoring Platform (SIMP) Puppet modules released by the National Security Agency (NSA) In addition to the example profile, an example Puppetfile and Hiera data are also provided Getting Started Adding the Modules This repository contains an example Puppetfile that can be used with Puppet Enterpri

This script allows users to scan networks for detecting Open Relay on SNMP, UDP Amplification on DNS and NTP.

open_relay_udp_amp This script allows users to scan networks for detecting Open Relay on SNMP, UDP Amplification on DNS and NTP Educational purposes only! Use in you own pentest lab (will give docker files links for such in future, but basic DNS image, NTP server with MONLIST vulnerability and open relay server are good enough) This script utilises weaknesses of DNS and NTP, t