#VU14448 Stack-based buffer overflow in Network Time Protocol - CVE-2018-12327
Published: August 14, 2018 / Updated: June 17, 2021
Network Time Protocol
ntp.org
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to stack-based buffer overflow in the Network Time Protocol Query (ntpq) program and Network Time Protocol daemon (ntpd) when handling malicious input. A local attacker can submit a long string argument for an IPv4 or IPv6 command-line parameter, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.