Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2019.3707.2
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3707-2)
Summary:The remote host is missing an update for the 'ntp' package(s) announced via the USN-3707-2 advisory.
Description:Summary:
The remote host is missing an update for the 'ntp' package(s) announced via the USN-3707-2 advisory.

Vulnerability Insight:
USN-3707-1 and USN-3349-1 fixed several vulnerabilities in NTP. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

Miroslav Lichvar discovered that NTP incorrectly handled certain spoofed
addresses when performing rate limiting. A remote attacker could possibly
use this issue to perform a denial of service. (CVE-2016-7426)

Matthew Van Gundy discovered that NTP incorrectly handled certain crafted
broadcast mode packets. A remote attacker could possibly use this issue to
perform a denial of service. (CVE-2016-7427, CVE-2016-7428)

Matthew Van Gundy discovered that NTP incorrectly handled certain control
mode packets. A remote attacker could use this issue to set or unset traps.
(CVE-2016-9310)

Matthew Van Gundy discovered that NTP incorrectly handled the trap service.
A remote attacker could possibly use this issue to cause NTP to crash, resulting
in a denial of service. (CVE-2016-9311)

It was discovered that the NTP legacy DPTS refclock driver incorrectly handled
the /dev/datum device. A local attacker could possibly use this issue to cause
a denial of service. (CVE-2017-6462)

It was discovered that NTP incorrectly handled certain invalid settings in a
:config directive. A remote authenticated user could possibly use this issue
to cause NTP to crash, resulting in a denial of service. (CVE-2017-6463)

Michael Macnair discovered that NTP incorrectly handled certain responses.
A remote attacker could possibly use this issue to execute arbitrary code.
(CVE-2018-7183)

Miroslav Lichvar discovered that NTP incorrectly handled certain
zero-origin timestamps. A remote attacker could possibly use this issue to
cause a denial of service. (CVE-2018-7185)

Affected Software/OS:
'ntp' package(s) on Ubuntu 12.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-7426
BugTraq ID: 94451
http://www.securityfocus.com/bid/94451
CERT/CC vulnerability note: VU#633847
https://www.kb.cert.org/vuls/id/633847
FreeBSD Security Advisory: FreeBSD-SA-18:02
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
RedHat Security Advisories: RHSA-2017:0252
http://rhn.redhat.com/errata/RHSA-2017-0252.html
http://www.securitytracker.com/id/1037354
https://usn.ubuntu.com/3707-2/
Common Vulnerability Exposure (CVE) ID: CVE-2016-7427
BugTraq ID: 94447
http://www.securityfocus.com/bid/94447
Common Vulnerability Exposure (CVE) ID: CVE-2016-7428
BugTraq ID: 94446
http://www.securityfocus.com/bid/94446
Common Vulnerability Exposure (CVE) ID: CVE-2016-9310
BugTraq ID: 94452
http://www.securityfocus.com/bid/94452
Common Vulnerability Exposure (CVE) ID: CVE-2016-9311
BugTraq ID: 94444
http://www.securityfocus.com/bid/94444
Common Vulnerability Exposure (CVE) ID: CVE-2017-6462
BugTraq ID: 97045
http://www.securityfocus.com/bid/97045
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:03.ntp.asc
RedHat Security Advisories: RHSA-2017:3071
https://access.redhat.com/errata/RHSA-2017:3071
RedHat Security Advisories: RHSA-2018:0855
https://access.redhat.com/errata/RHSA-2018:0855
http://www.securitytracker.com/id/1038123
Common Vulnerability Exposure (CVE) ID: CVE-2017-6463
BugTraq ID: 97049
http://www.securityfocus.com/bid/97049
Common Vulnerability Exposure (CVE) ID: CVE-2018-7183
BugTraq ID: 103351
http://www.securityfocus.com/bid/103351
http://support.ntp.org/bin/view/Main/NtpBug3414
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
https://security.netapp.com/advisory/ntap-20180626-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://www.synology.com/support/security/Synology_SA_18_13
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.asc
https://security.gentoo.org/glsa/201805-12
https://www.oracle.com//security-alerts/cpujul2021.html
https://usn.ubuntu.com/3707-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-7185
BugTraq ID: 103339
http://www.securityfocus.com/bid/103339
Bugtraq: 20180301 [Newsletter/Marketing] [slackware-security] ntp (SSA:2018-060-02) (Google Search)
http://www.securityfocus.com/archive/1/541824/100/0/threaded
http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-Updates.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.