Bug 1550223 (CVE-2018-7183) - CVE-2018-7183 ntp: decodearr() can write beyond its buffer limit
Summary: CVE-2018-7183 ntp: decodearr() can write beyond its buffer limit
Keywords:
Status: NEW
Alias: CVE-2018-7183
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1550228 1550229
Blocks: 1550226
TreeView+ depends on / blocked
 
Reported: 2018-02-28 19:48 UTC by Pedro Sampaio
Modified: 2019-09-29 14:34 UTC (History)
2 users (show)

Fixed In Version: ntp 4.2.8p11
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Pedro Sampaio 2018-02-28 19:48:09 UTC
ntpq is a monitoring and control program for ntpd. decodearr() is an internal function of ntpq that is used to -- wait for it -- decode an array in a response string when formatted data is being displayed. This is a problem in affected versions of ntpq if a maliciously-altered ntpd returns an array result that will trip this bug, or if a bad actor is able to read an ntpq request on its way to a remote ntpd server and forge and send a response before the remote ntpd sends its response. It's potentially possible that the malicious data could become injectable/executable code.

References:

http://support.ntp.org/bin/view/Main/NtpBug3414

Comment 1 Pedro Sampaio 2018-02-28 19:51:33 UTC
Created ntp tracking bugs for this issue:

Affects: fedora-all [bug 1550228]


Note You need to log in before you can comment on or make changes to this bug.