Vulnerability Description
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | >= 4.2.6, < 4.2.8 |
| Synology | Router Manager | >= 1.1, < 1.1.6-6931-3 |
| Synology | Skynas | < 6.1.5-15254 |
| Synology | Virtual Diskstation Manager | < 6.1.6-15266 |
| Synology | Diskstation Manager | >= 5.2, < 6.1.6-15266 |
| Synology | Vs960Hd Firmware | < 2.2.3-1505 |
| Synology | Vs960Hd | - |
| Canonical | Ubuntu Linux | 12.04 |
| Netapp | Hci | - |
| Netapp | Solidfire | - |
| Hpe | Hpux-Ntp | < c.4.2.8.4.0 |
| Oracle | Fujitsu M10-1 Firmware | < xcp2361 |
| Oracle | Fujitsu M10-1 | - |
| Oracle | Fujitsu M10-4 Firmware | < xcp2361 |
| Oracle | Fujitsu M10-4 | - |
| Oracle | Fujitsu M10-4S Firmware | < xcp2361 |
| Oracle | Fujitsu M10-4S | - |
| Oracle | Fujitsu M12-1 Firmware | < xcp2361 |
| Oracle | Fujitsu M12-1 | - |
| Oracle | Fujitsu M12-2 Firmware | < xcp2361 |
References
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-UpdaThird Party AdvisoryVDB Entry
- http://support.ntp.org/bin/view/Main/NtpBug3454MitigationVendor Advisory
- http://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/103339Third Party AdvisoryVDB Entry
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:02.ntp.ascThird Party Advisory
- https://security.gentoo.org/glsa/201805-12Third Party Advisory
- https://security.netapp.com/advisory/ntap-20180626-0001/Third Party Advisory
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpeThird Party Advisory
- https://usn.ubuntu.com/3707-1/Third Party Advisory
- https://usn.ubuntu.com/3707-2/Third Party Advisory
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlThird Party Advisory
- https://www.synology.com/support/security/Synology_SA_18_13Third Party Advisory
- http://packetstormsecurity.com/files/146631/Slackware-Security-Advisory-ntp-UpdaThird Party AdvisoryVDB Entry
- http://support.ntp.org/bin/view/Main/NtpBug3454MitigationVendor Advisory
- http://www.securityfocus.com/archive/1/541824/100/0/threadedThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-7185?
CVE-2018-7185 is a vulnerability with a CVSS score of 7.5 (HIGH). The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address ...
How severe is CVE-2018-7185?
CVE-2018-7185 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7185?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp, Synology Router Manager, Synology Skynas, Synology Virtual Diskstation Manager, Synology Diskstation Manager.