Out-of-Bounds Affecting ntp package, versions <1:4.2.8p10+dfsg-1
Threat Intelligence
EPSS
0.49% (77th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NTP-526794
- published 27 Mar 2017
- disclosed 27 Mar 2017
Introduced: 27 Mar 2017
CVE-2017-6458 Open this link in a new tabHow to fix?
Upgrade Debian:11 ntp to version 1:4.2.8p10+dfsg-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ntp package and not the ntp package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
References
- https://support.apple.com/HT208144
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
- https://security-tracker.debian.org/tracker/CVE-2017-6458
- http://support.ntp.org/bin/view/Main/NtpBug3379
- http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
- http://www.securityfocus.com/bid/97051
- http://www.securitytracker.com/id/1038123
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-6458
- http://seclists.org/fulldisclosure/2017/Sep/62
- https://bto.bluecoat.com/security-advisory/sa147
- https://support.apple.com/kb/HT208144
- http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
- http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://support.f5.com/csp/article/K99254031
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
- http://seclists.org/fulldisclosure/2017/Nov/7
- http://www.ubuntu.com/usn/USN-3349-1
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
CVSS Scores
version 3.1