9.8
CVSSv3

CVE-2018-12327

Published: 20/06/2018 Updated: 24/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an malicious user to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntp ntp 4.2.8

Vendor Advisories

A security issue was fixed in ntpq and ntpdc ...
Debian Bug report logs - #902410 redis: CVE-2018-12326 Package: redis; Maintainer for redis is Chris Lamb <lamby@debianorg>; Source for redis is src:redis (PTS, buildd, popcon) Reported by: Chris Lamb <lamby@debianorg> Date: Tue, 26 Jun 2018 08:39:01 UTC Severity: grave Tags: security Found in versions 2:2817-1 ...
Synopsis Low: ntp security update Type/Severity Security Advisory: Low Topic An update for ntp is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Low: ntp security update Type/Severity Security Advisory: Low Topic An update for ntp is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed se ...
Synopsis Low: ntp security update Type/Severity Security Advisory: Low Topic An update for ntp is now available for Red Hat Enterprise Linux 76 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Low: ntp security, bug fix, and enhancement update Type/Severity Security Advisory: Low Topic An update for ntp is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, ...
ntpd in ntp 42x before 428p7 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack This issue exists because of an incomplete fix for CVE-2016-1549(CVE-2018-7170) The ntpq and ntpdc command-line ...
The ntpq and ntpdc command-line utilities that are part of ntp package are vulnerable to stack-based buffer overflow via crafted hostname Applications using these vulnerable utilities with an untrusted input may be potentially exploited, resulting in a crash or arbitrary code execution under privileges of that application(CVE-2018-12327) ...
The ntpq and ntpdc command-line utilities that are part of ntp package are vulnerable to stack-based buffer overflow via crafted hostname Applications using these vulnerable utilities with an untrusted input may be potentially exploited, resulting in a crash or arbitrary code execution under privileges of that application ...
Stack-based buffer overflow in ntpq and ntpdc of NTP version 428p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter ...

Exploits

# Exploit Title: ntpq and ntpdc 428p11 Local Buffer Overflow # Date: 2018-06-06 # Exploit Author: Fakhri Zulkifli (@d0lph1n98) # Vendor Homepage: wwwntporg/ # Software Link: wwwntporg/downloadshtml # Version: 428p11 and earlier # Tested on: 428p11 # CVE : CVE-2018-12327 Stack-based buffer overflow in ntpq and ntpdc of NTP ...
ntp version 428p11 local buffer overflow proof of concept exploit ...