ID CVE-2018-7182
Summary The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
References
Vulnerable Configurations
  • cpe:2.3:a:ntp:ntp:4.2.8:p10
    cpe:2.3:a:ntp:ntp:4.2.8:p10
  • NTP 4.2.8 Patch 6
    cpe:2.3:a:ntp:ntp:4.2.8:p6
  • NTP 4.2.8 Patch 7
    cpe:2.3:a:ntp:ntp:4.2.8:p7
  • cpe:2.3:a:ntp:ntp:4.2.8:p8
    cpe:2.3:a:ntp:ntp:4.2.8:p8
  • NTP 4.2.8 Patch 9
    cpe:2.3:a:ntp:ntp:4.2.8:p9
  • Canonical Ubuntu Linux 17.10
    cpe:2.3:o:canonical:ubuntu_linux:17.10
  • Canonical Ubuntu Linux 18.04 LTS Edition
    cpe:2.3:o:canonical:ubuntu_linux:18.04:-:-:-:lts
  • cpe:2.3:a:netapp:element_software
    cpe:2.3:a:netapp:element_software
CVSS
Base: 5.0
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
exploit-db via4
file exploits/linux/local/45846.py
id EDB-ID:45846
last seen 2018-11-30
modified 2018-11-14
platform linux
port
published 2018-11-14
reporter Exploit-DB
source https://www.exploit-db.com/download/45846
title ntpd 4.2.8p10 - Out-of-Bounds Read (PoC)
type local
nessus via4
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0167.NASL
    description An update of 'vim', 'ntp', 'openjdk', 'libmspack', 'blktrace', 'systemd', 'perl' packages of Photon OS has been released.
    last seen 2019-02-21
    modified 2019-02-07
    plugin id 111946
    published 2018-08-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=111946
    title Photon OS 1.0: Blktrace / Libmspack / Ntp / Openjdk / Perl / Systemd / Vim PHSA-2018-1.0-0167 (deprecated)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2018-1009.NASL
    description Ephemeral association time spoofing additional protection ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549 .(CVE-2018-7170) Interleaved symmetric mode cannot recover from bad state ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the 'received' timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704 .(CVE-2018-7184) Ephemeral association time spoofing A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.(CVE-2016-1549) Buffer read overrun leads information leak in ctl_getitem() The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10. (CVE-2018-7182) Unauthenticated packet can reset authenticated interleaved association The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the 'other side' of an interleaved association causing the victim ntpd to reset its association.(CVE-2018-7185) decodearr() can write beyond its buffer limit Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.(CVE-2018-7183)
    last seen 2019-02-21
    modified 2018-08-31
    plugin id 109697
    published 2018-05-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109697
    title Amazon Linux AMI : ntp (ALAS-2018-1009)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-1765-2.NASL
    description This update for ntp fixes the following issues : Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) Don't use libevent's cached time stamps in sntp. (bsc#1077445) This update is a reissue of the previous update with LTSS channels included. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 118269
    published 2018-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118269
    title SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1765-2)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-1765-1.NASL
    description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445) This update is a reissue of the previous update with LTSS channels included. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 110639
    published 2018-06-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110639
    title SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:1765-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_AF485EF41C5811E88477D05099C0AE8C.NASL
    description Network Time Foundation reports : The NTP Project at Network Time Foundation is releasing ntp-4.2.8p11. This release addresses five security issues in ntpd : - LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability: ephemeral association attack - INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909 : ctl_getitem(): buffer read overrun leads to undefined behavior and information leak - LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated ephemeral associations - LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode cannot recover from bad state - LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909 : Unauthenticated packet can reset authenticated interleaved association one security issue in ntpq : - MEDIUM: Sec 3414 / CVE-2018-7183 / VU#961909 : ntpq:decodearr() can write beyond its buffer limit and provides over 33 bugfixes and 32 other improvements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 107046
    published 2018-02-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107046
    title FreeBSD : ntp -- multiple vulnerabilities (af485ef4-1c58-11e8-8477-d05099c0ae8c)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0808-1.NASL
    description This update for ntp fixes the following issues: Security issues fixed : - CVE-2016-1549: Significant additional protections against CVE-2016-1549 that was fixed in ntp-4.2.8p7 (bsc#1082210). - CVE-2018-7170: Ephemeral association time spoofing additional protection (bsc#1083424). - CVE-2018-7182: Buffer read overrun leads information leak in ctl_getitem() (bsc#1083426). - CVE-2018-7183: decodearr() can write beyond its buffer limit (bsc#1083417). - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state (bsc#1083422). - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association (bsc#1083420). Bug fixes : - bsc#1077445: Don't use libevent's cached time stamps in sntp. - Disable CMAC in ntp when building against a version of OpenSSL that doesn't support it. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 108651
    published 2018-03-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=108651
    title SUSE SLES11 Security Update : ntp (SUSE-SU-2018:0808-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-0956-1.NASL
    description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 109085
    published 2018-04-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109085
    title SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:0956-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2018-060-02.NASL
    description New ntp packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
    last seen 2018-09-07
    modified 2018-09-06
    plugin id 107103
    published 2018-03-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107103
    title Slackware 14.0 / 14.1 / 14.2 / current : ntp (SSA:2018-060-02)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3707-1.NASL
    description Yihan Lian discovered that NTP incorrectly handled certain malformed mode 6 packets. A remote attacker could possibly use this issue to cause ntpd to crash, resulting in a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7182) Michael Macnair discovered that NTP incorrectly handled certain responses. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-7183) Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7184) Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-7185). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 110974
    published 2018-07-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110974
    title Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : ntp vulnerabilities (USN-3707-1)
  • NASL family PhotonOS Local Security Checks
    NASL id PHOTONOS_PHSA-2018-1_0-0167_NTP.NASL
    description An update of the ntp package has been released.
    last seen 2019-02-08
    modified 2019-02-07
    plugin id 121863
    published 2019-02-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=121863
    title Photon OS 1.0: Ntp PHSA-2018-1.0-0167
  • NASL family Misc.
    NASL id NTP_4_2_8P11.NASL
    description The version of the remote NTP server is 4.x prior to 4.2.8p11. It is, therefore, affected by multiple vulnerabilities, which allow denial of service attacks, information disclosure and possibly, remote code execution.
    last seen 2019-02-21
    modified 2018-08-16
    plugin id 107258
    published 2018-03-09
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=107258
    title Network Time Protocol Daemon (ntpd) 4.x < 4.2.8p11 Multiple Vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-1464-1.NASL
    description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445) - Fix systemd migration in %pre (bsc#1034892). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 110224
    published 2018-05-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110224
    title SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1464-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201805-12.NASL
    description The remote host is affected by the vulnerability described in GLSA-201805-12 (NTP: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-09-04
    plugin id 110176
    published 2018-05-29
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110176
    title GLSA-201805-12 : NTP: Multiple vulnerabilities
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-376.NASL
    description This update for ntp fixes the following issues : - Update to 4.2.8p11 (bsc#1082210) : - CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. - CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) - CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) - CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) - CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) - CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445) This update was imported from the SUSE:SLE-12-SP1:Update update project.
    last seen 2019-02-21
    modified 2018-09-06
    plugin id 109102
    published 2018-04-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=109102
    title openSUSE Security Update : ntp (openSUSE-2018-376)
packetstorm via4
data source https://packetstormsecurity.com/files/download/150341/ntpd428p10-oobread.txt
id PACKETSTORM:150341
last seen 2018-11-16
published 2018-11-15
reporter Magnus Klaaborg Stubman
source https://packetstormsecurity.com/files/150341/ntpd-4.2.8p10-Out-Of-Bounds-Read.html
title ntpd 4.2.8p10 Out-Of-Bounds Read
refmap via4
bid 103191
bugtraq 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02)
confirm
exploit-db 45846
freebsd FreeBSD-SA-18:02
gentoo GLSA-201805-12
misc http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
ubuntu USN-3707-1
Last major update 06-03-2018 - 15:29
Published 06-03-2018 - 15:29
Last modified 01-03-2019 - 08:12
Back to Top