[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2018-12327 -- ntp

ID: oval:org.secpod.oval:def:2001095Date: (C)2019-04-22   (M)2024-01-29
Class: VULNERABILITYFamily: unix




Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

Platform:
Debian 8.x
Debian 9.x
Product:
ntp
Reference:
CVE-2018-12327
CVE    1
CVE-2018-12327
CPE    3
cpe:/a:ntp:ntp
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies