CVE-2018-12327

Published: 20 June 2018

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

Priority

Negligible

CVSS 3 base score: 9.8

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
Upstream
Released (4.2.8p12)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1:4.2.8p12+dfsg-3ubuntu3)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1:4.2.8p12+dfsg-3ubuntu3)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:4.2.8p4+dfsg-3ubuntu5.10)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1)