Vulnerability Description
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ntp | Ntp | 4.2.8 |
Related Weaknesses (CWE)
References
- https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554Third Party Advisory
- https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321Third Party Advisory
- https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554Third Party Advisory
- https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321Third Party Advisory
FAQ
What is CVE-2023-26554?
CVE-2023-26554 is a vulnerability with a CVSS score of 5.6 (MEDIUM). mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
How severe is CVE-2023-26554?
CVE-2023-26554 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-26554?
Check the references section above for vendor advisories and patch information. Affected products include: Ntp Ntp.