Release Date: | 2018-06-20 |
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
See more information about CVE-2018-12327 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 9.8 | Base Metrics: | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Access Vector: | Network | Attack Complexity: | Low |
Privileges Required: | None | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | High |
Integrity Impact: | High | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 6 (ntp) | ELSA-2018-3854 | 2018-12-19 |
Oracle Linux version 7 (ntp) | ELSA-2019-2077 | 2019-08-13 |
Oracle VM version 3.3 (ntp) | OVMSA-2018-0290 | 2018-12-19 |
Oracle VM version 3.4 (ntp) | OVMSA-2018-0290 | 2018-12-19 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team