Description
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4229-1 | NTP vulnerability |
Ubuntu USN |
USN-4229-2 | NTP vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T08:30:59.728Z
Reserved: 2018-06-13T00:00:00.000Z
Link: CVE-2018-12327
No data.
Status : Modified
Published: 2018-06-20T14:29:00.227
Modified: 2024-11-21T03:44:59.940
Link: CVE-2018-12327
OpenCVE Enrichment
No data.
Ubuntu USN