Yihan Lian discovered that NTP incorrectly handled certain malformed mode 6 packets. A remote attacker could possibly use this issue to cause ntpd to crash, resulting in a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7182)
Michael Macnair discovered that NTP incorrectly handled certain responses. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-7183)
Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-7184)
Miroslav Lichvar discovered that NTP incorrectly handled certain zero-origin timestamps. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-7185)
{ "binaries": [ { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13", "binary_name": "ntp" }, { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13", "binary_name": "ntpdate" } ], "availability": "No subscription required" }
{ "cves": [ { "id": "CVE-2018-7183", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2018-7185", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ] } ], "ecosystem": "Ubuntu:14.04:LTS" }
{ "binaries": [ { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.9", "binary_name": "ntp" }, { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.9", "binary_name": "ntpdate" } ], "availability": "No subscription required" }
{ "cves": [ { "id": "CVE-2018-7183", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2018-7185", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ] } ], "ecosystem": "Ubuntu:16.04:LTS" }
{ "binaries": [ { "binary_version": "1:4.2.8p10+dfsg-5ubuntu7.1", "binary_name": "ntp" }, { "binary_version": "1:4.2.8p10+dfsg-5ubuntu7.1", "binary_name": "ntpdate" }, { "binary_version": "1:4.2.8p10+dfsg-5ubuntu7.1", "binary_name": "sntp" } ], "availability": "No subscription required" }
{ "cves": [ { "id": "CVE-2018-7182", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2018-7183", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ] }, { "id": "CVE-2018-7184", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ] }, { "id": "CVE-2018-7185", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ] } ], "ecosystem": "Ubuntu:18.04:LTS" }