Korean
<< Back
VID 23282
Severity 30
Port 123
Protocol UDP
Class NTPD
Detailed Description The NTP daemon, according its version number, is vulnerable to multiple vulnerabilities. Network Time Protocol (NTP) daemon is responsible for providing accurate time reports used for synchronizing the clocks on installed systems. The version of the remote NTP server is 4.x prior to 4.2.8p11. It is, therefore, affected by multiple vulnerabilities, which allow denial of service attacks, information disclosure and possibly, remote code execution.

* Note: This check solely relied on the version number of the remote NTP daemon to assess this vulnerability, so this might be a false positive.

* References:
https://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S

* Platforms Affected:
NTPD versions prior to 4.2.8p11
Any operating system Any version
Recommendation Upgrade to the latest version of NTP (4.2.8p11 or later), available from the NTP Software Downloads Web page at http://www.ntp.org/downloads.html
Related URL CVE-2016-1549,CVE-2018-7170,CVE-2018-7182,CVE-2018-7183,CVE-2018-7184,CVE-2018-7185 (CVE)
Related URL 88200,103191,103192,103194,103339 (SecurityFocus)
Related URL (ISS)