Vulnerability Details : CVE-2017-6458
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
Vulnerability category: Overflow
Products affected by CVE-2017-6458
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*
- cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*
- cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-6458
0.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-6458
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-6458
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-6458
-
http://www.ubuntu.com/usn/USN-3349-1
USN-3349-1: NTP vulnerabilities | Ubuntu security notices | Ubuntu
-
http://seclists.org/fulldisclosure/2017/Sep/62
Full Disclosure: APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
-
http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
Bugtraq
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
[SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists
-
https://support.apple.com/HT208144
About the security content of macOS High Sierra 10.13 - Apple SupportThird Party Advisory
-
http://support.ntp.org/bin/view/Main/NtpBug3379
NtpBug3379 < Main < NTPPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/97051
NTP CVE-2017-6458 Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
Slackware Security Advisory - ntp Updates ≈ Packet Storm
-
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
Support Content Notification - Support Portal - Broadcom support portal
-
http://www.securitytracker.com/id/1038123
ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash - SecurityTrackerThird Party Advisory;VDB Entry
-
https://bto.bluecoat.com/security-advisory/sa147
Broadcom Inc. (Customer) - Sign In
-
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
SecurityNotice < Main < NTPVendor Advisory
-
https://support.apple.com/kb/HT208144
About the security content of macOS High Sierra 10.13 - Apple Support
-
http://seclists.org/fulldisclosure/2017/Nov/7
Full Disclosure: APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
-
https://support.f5.com/csp/article/K99254031
NTP vulnerability CVE-2017-6458
-
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
Third Party Advisory
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
HPESBUX03962 rev.1 - HP-UX NTP service, multiple vulnerabilitiesThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
-
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
Siemens SIMATIC NET CP 443-1 OPC UA | CISA
Jump to