CVE-2018-7184 (retired)

Priority
Description
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the
"received" timestamp, which allows remote attackers to cause a denial of
service (disruption) by sending a packet with a zero-origin timestamp
causing the association to reset and setting the contents of the packet as
the most recent timestamp. This issue is a result of an incomplete fix for
CVE-2015-7704.
Assigned-to
mdeslaur
Package
Source: ntp (LP Ubuntu Debian)
Upstream:released (4.2.8p11)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (1:4.2.6.p5+dfsg-3ubuntu2.14.04.12)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1:4.2.8p4+dfsg-3ubuntu5.8)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:4.2.8p10+dfsg-5ubuntu7.1)
Ubuntu 18.10 (Cosmic Cuttlefish):released (1:4.2.8p11+dfsg-1ubuntu1)
Patches:
Upstream:http://bk.ntp.org/ntp-stable/?PAGE=cset&REV=5a76f46bK1M87GD1tJounOczC-5Zow
More Information

Updated: 2019-03-26 12:27:45 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)