CVE-2018-12327:ntp: buffer overflow in ntpq and ntpdc
Bug #1849197 reported by
Bruce Jones
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Jim Somerville |
Bug Description
CVE-2018-12327
status : fixed
cvss2Score : 7.5
Attack Vector: N
Access Complexity : L
Autentication: N
Availability Impact :P
Affected packages:
['ntp', 'ntp-perl', 'ntpdate']
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
https:/
CVE References
tags: | added: stx.security |
Changed in starlingx: | |
importance: | Undecided → High |
tags: | added: stx.3.0 |
Changed in starlingx: | |
status: | New → Triaged |
Changed in starlingx: | |
assignee: | nobody → Cindy Xie (xxie1) |
Changed in starlingx: | |
assignee: | Cindy Xie (xxie1) → Jim Somerville (jsomervi) |
information type: | Private Security → Public Security |
tags: | added: in-r-stx20 |
To post a comment you must log in.
This CVE meets the fix criteria for StarlingX. Therefore, it needs to be fixed in master for stx.3.0 and then cherry-picked to r/stx.2.0.