CVE-2016-3962

Published on: 07/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:01 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Certain versions of Ims-lantime M1000 from Meinberg contain the following vulnerability:

Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.

  • CVE-2016-3962 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.3 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW LOW LOW

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Meinberg NTP Time Server Vulnerabilities | ICS-CERT Third Party Advisory
US Government Resource
ics-cert.us-cert.gov
text/html
URL Logo MISC ics-cert.us-cert.gov/advisories/ICSA-16-175-03
Meinberg NTP Time Server ELX800/GPS M4x V5.30p - Remote Command Execution / Escalate Privileges - Hardware remote Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40120

Exploit/POC from Github

CVE-2016-3962-Exploit

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
HardwareMeinbergIms-lantime M1000-AllAllAll
HardwareMeinbergIms-lantime M1000-AllAllAll
HardwareMeinbergIms-lantime M3000-AllAllAll
HardwareMeinbergIms-lantime M3000-AllAllAll
HardwareMeinbergIms-lantime M500-AllAllAll
HardwareMeinbergIms-lantime M500-AllAllAll
HardwareMeinbergLantime M100-AllAllAll
HardwareMeinbergLantime M100-AllAllAll
HardwareMeinbergLantime M200-AllAllAll
HardwareMeinbergLantime M200-AllAllAll
HardwareMeinbergLantime M300-AllAllAll
HardwareMeinbergLantime M300-AllAllAll
HardwareMeinbergLantime M400-AllAllAll
HardwareMeinbergLantime M400-AllAllAll
HardwareMeinbergLantime M600-AllAllAll
HardwareMeinbergLantime M600-AllAllAll
HardwareMeinbergLantime M900-AllAllAll
HardwareMeinbergLantime M900-AllAllAll
HardwareMeinbergLces-AllAllAll
HardwareMeinbergLces-AllAllAll
Operating
System
MeinbergNtp Server FirmwareAllAllAllAll
HardwareMeinbergSyncfire 1100-AllAllAll
HardwareMeinbergSyncfire 1100-AllAllAll
  • cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:ims-lantime_m3000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:ims-lantime_m3000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:ims-lantime_m500:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:ims-lantime_m500:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m100:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m100:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m200:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m200:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m400:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m400:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m600:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m600:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m900:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lantime_m900:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lces:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:lces:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:meinberg:ntp_server_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:syncfire_1100:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:meinberg:syncfire_1100:-:*:*:*:*:*:*:*: