ALT-PU-2018-2737-1
Closed vulnerabilities
BDU:2018-01637
Уязвимость реализации протокола синхронизации времени NTP, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00216
Уязвимость функции decodearr программы мониторинга ntpq реализации протокола синхронизации времени NTP, позволяющая нарушителю выполнить произвольный код
BDU:2019-00217
Уязвимость демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками управления ключами, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2019-00218
Уязвимость программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с ошибками обработки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00219
Уязвимость метода ctl_getitem программы-демона ntpd реализации протокола синхронизации времени NTP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00093
Уязвимость сетевого протокола NTP, связанная с ошибкой при обработке данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-01499
Уязвимость реализации протокола синхронизации времени NTP межсетевого экрана Eltex «ESR-200», позволяющая нарушителю выполнить вредоносный код или повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2016-1549
A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 88200
- 88200
- 1035705
- 1035705
- http://www.talosintelligence.com/reports/TALOS-2016-0083/
- http://www.talosintelligence.com/reports/TALOS-2016-0083/
- FreeBSD-SA-16:16
- FreeBSD-SA-16:16
- GLSA-201607-15
- GLSA-201607-15
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Modified: 2024-11-21
CVE-2018-12327
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
- 104517
- 104517
- RHSA-2018:3853
- RHSA-2018:3853
- RHSA-2018:3854
- RHSA-2018:3854
- RHSA-2019:2077
- RHSA-2019:2077
- https://gist.github.com/fakhrizulkifli/9b58ed8e0354e8deee50b0eebd1c011f
- https://gist.github.com/fakhrizulkifli/9b58ed8e0354e8deee50b0eebd1c011f
- GLSA-201903-15
- GLSA-201903-15
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-4229-1
- USN-4229-1
- 44909
- 44909
Modified: 2025-01-14
CVE-2018-7170
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3415
- http://support.ntp.org/bin/view/Main/NtpBug3415
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 103194
- 103194
- https://bugzilla.redhat.com/show_bug.cgi?id=1550214
- https://bugzilla.redhat.com/show_bug.cgi?id=1550214
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Modified: 2024-11-21
CVE-2018-7182
The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3412
- http://support.ntp.org/bin/view/Main/NtpBug3412
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 103191
- 103191
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-1
- USN-3707-1
- 45846
- 45846
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Modified: 2024-11-21
CVE-2018-7183
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
- http://support.ntp.org/bin/view/Main/NtpBug3414
- http://support.ntp.org/bin/view/Main/NtpBug3414
- http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
- http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
- 103351
- 103351
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-1
- USN-3707-1
- USN-3707-2
- USN-3707-2
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Modified: 2025-01-14
CVE-2018-7184
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3453
- http://support.ntp.org/bin/view/Main/NtpBug3453
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 103192
- 103192
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-1
- USN-3707-1
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13
Modified: 2025-01-14
CVE-2018-7185
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3454
- http://support.ntp.org/bin/view/Main/NtpBug3454
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
- 103339
- 103339
- FreeBSD-SA-18:02
- FreeBSD-SA-18:02
- GLSA-201805-12
- GLSA-201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- USN-3707-1
- USN-3707-1
- USN-3707-2
- USN-3707-2
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.synology.com/support/security/Synology_SA_18_13
- https://www.synology.com/support/security/Synology_SA_18_13