CVE-2018-8956Improper Input Validation in NTP

Severity
5.3MEDIUMNVD
EPSS
2.0%
top 16.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 6
Latest updateMay 24

Description

ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

Debianntp/ntp< 1:4.2.8p14+dfsg-1
NVDntp/ntp4.2.8

🔴Vulnerability Details

3
GHSA
GHSA-gg7p-jc5w-p68m: ntpd in ntp 42022-05-24
CVEList
CVE-2018-8956: ntpd in ntp 42020-05-06
OSV
CVE-2018-8956: ntpd in ntp 42020-05-06

📋Vendor Advisories

2
Red Hat
ntp: ntpd allows remote attackers to prevent a broadcast client from synchronizing its clock2020-05-06
Debian
CVE-2018-8956: ntp - ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to ...2018

📄Research Papers

1
arXiv
Preventing Time Synchronization in NTP's Broadcast Mode2020-05-14

💬Community

2
Bugzilla
CVE-2018-8956 ntp: ntpd allows remote attackers to prevent a broadcast client from synchronizing its clock2020-06-18
Bugzilla
CVE-2018-8956 ntp: ntpd allows remote attackers to prevent a broadcast client from synchronizing its clock [fedora-all]2020-06-18