CVE-2018-7185

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.

References

http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html

http://support.ntp.org/bin/view/Main/NtpBug3454

http://www.securityfocus.com/archive/1/541824/100/0/threaded

http://www.securityfocus.com/bid/103339

https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc

https://security.gentoo.org/glsa/201805-12

https://security.netapp.com/advisory/ntap-20180626-0001/

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us

https://usn.ubuntu.com/3707-1/

https://usn.ubuntu.com/3707-2/

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

https://www.synology.com/support/security/Synology_SA_18_13

Details

Source: MITRE

Published: 2018-03-06

Updated: 2020-08-24

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*

cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*

cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 5

OR

cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
129259EulerOS 2.0 SP3 : ntp (EulerOS-SA-2019-2066)NessusHuawei Local Security Checks
critical
126847EulerOS 2.0 SP2 : ntp (EulerOS-SA-2019-1719)NessusHuawei Local Security Checks
critical
125010EulerOS Virtualization 3.0.1.0 : ntp (EulerOS-SA-2019-1557)NessusHuawei Local Security Checks
critical
124450EulerOS 2.0 SP5 : ntp (EulerOS-SA-2019-1323)NessusHuawei Local Security Checks
critical
123908EulerOS Virtualization 2.5.3 : ntp (EulerOS-SA-2019-1222)NessusHuawei Local Security Checks
critical
121863Photon OS 1.0: Ntp PHSA-2018-1.0-0167NessusPhotonOS Local Security Checks
critical
118269SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1765-2)NessusSuSE Local Security Checks
critical
111946Photon OS 1.0: Blktrace / Libmspack / Ntp / Openjdk / Perl / Systemd / Vim PHSA-2018-1.0-0167 (deprecated)NessusPhotonOS Local Security Checks
critical
110974Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : ntp vulnerabilities (USN-3707-1)NessusUbuntu Local Security Checks
critical
110639SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:1765-1)NessusSuSE Local Security Checks
critical
110224SUSE SLES12 Security Update : ntp (SUSE-SU-2018:1464-1)NessusSuSE Local Security Checks
critical
110176GLSA-201805-12 : NTP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
109697Amazon Linux AMI : ntp (ALAS-2018-1009)NessusAmazon Linux Local Security Checks
critical
109102openSUSE Security Update : ntp (openSUSE-2018-376)NessusSuSE Local Security Checks
critical
109085SUSE SLED12 / SLES12 Security Update : ntp (SUSE-SU-2018:0956-1)NessusSuSE Local Security Checks
critical
108651SUSE SLES11 Security Update : ntp (SUSE-SU-2018:0808-1)NessusSuSE Local Security Checks
critical
107258Network Time Protocol Daemon (ntpd) 4.x < 4.2.8p11 Multiple VulnerabilitiesNessusMisc.
critical
107103Slackware 14.0 / 14.1 / 14.2 / current : ntp (SSA:2018-060-02)NessusSlackware Local Security Checks
high
107046FreeBSD : ntp -- multiple vulnerabilities (af485ef4-1c58-11e8-8477-d05099c0ae8c)NessusFreeBSD Local Security Checks
critical