|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for ntp CESA-2018:3854 centos6|
|Summary:||The remote host is missing an update for the 'ntp'; package(s) announced via the CESA-2018:3854 advisory.|
The remote host is missing an update for the 'ntp'
package(s) announced via the CESA-2018:3854 advisory.
The Network Time Protocol (NTP) is used to synchronize a computer's time
with another referenced time source. These packages include the ntpd
service which continuously adjusts system time and utilities used to query
and configure the ntpd service.
* ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of
service or code execution (CVE-2018-12327)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
ntp on CentOS 6.
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-12327|
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 72306 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.