CVE-2018-7184
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/03/2018
Last modified:
14/01/2025
Description
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:* | ||
cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:* | ||
cpe:2.3:a:synology:router_manager:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:synology:virtual_diskstation_manager:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3453
- http://www.securityfocus.com/archive/1/541824/100/0/threaded
- http://www.securityfocus.com/bid/103192
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
- https://security.gentoo.org/glsa/201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://usn.ubuntu.com/3707-1/
- https://www.synology.com/support/security/Synology_SA_18_13
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
- http://support.ntp.org/bin/view/Main/NtpBug3453
- http://www.securityfocus.com/archive/1/541824/100/0/threaded
- http://www.securityfocus.com/bid/103192
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
- https://security.gentoo.org/glsa/201805-12
- https://security.netapp.com/advisory/ntap-20180626-0001/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://usn.ubuntu.com/3707-1/
- https://www.synology.com/support/security/Synology_SA_18_13