Executive Summary

Informations
NameCVE-2018-12327First vendor Publication2018-06-20
VendorCveLast vendor Modification2019-03-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

Nessus® Vulnerability Scanner

DateDescription
2019-01-08Name : The remote EulerOS host is missing a security update.
File : EulerOS_SA-2019-1014.nasl - Type : ACT_GATHER_INFO
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-e585e25b72.nasl - Type : ACT_GATHER_INFO
2018-12-20Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2018-3854.nasl - Type : ACT_GATHER_INFO
2018-09-20Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2018-1083.nasl - Type : ACT_GATHER_INFO
2018-08-31Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-1_0-0180.nasl - Type : ACT_GATHER_INFO
2018-08-31Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-2_0-0088.nasl - Type : ACT_GATHER_INFO
2018-08-20Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2018-229-01.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote NTP server is affected by multiple vulnerabilities.
File : ntp_4_2_8p12.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/104517
EXPLOIT-DB https://www.exploit-db.com/exploits/44909/
GENTOO https://security.gentoo.org/glsa/201903-15
MISC https://gist.github.com/fakhrizulkifli/9b58ed8e0354e8deee50b0eebd1c011f
REDHAT https://access.redhat.com/errata/RHSA-2018:3853
https://access.redhat.com/errata/RHSA-2018:3854
https://access.redhat.com/errata/RHSA-2019:2077

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2019-08-07 12:10:08
  • Multiple Updates
2019-03-21 21:19:15
  • Multiple Updates
2018-12-20 17:18:47
  • Multiple Updates
2018-08-10 21:19:52
  • Multiple Updates
2018-06-24 09:19:20
  • Multiple Updates
2018-06-20 21:20:36
  • First insertion