CVE-2018-12327

CRITICAL

NTP 4.2.8p11 - Buffer Overflow

Title source: llm

Description

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.

Exploits (1)

exploitdb WORKING POC
by Fakhri Zulkifli · textdoslinux
https://www.exploit-db.com/exploits/44909

Scores

CVSS v3 9.8
EPSS 0.1597
EPSS Percentile 94.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-787
Status published
Products (1)
ntp/ntp 4.2.8 p11
Published Jun 20, 2018
Tracked Since Feb 18, 2026