CVE-2017-6458
Summary
| CVE | CVE-2017-6458 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-27 17:59:00 UTC |
| Updated | 2023-11-07 02:49:00 UTC |
| Description | Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Operating System |
Apple |
Mac Os X |
All |
All |
All |
All |
| Application |
Hpe |
Hpux-ntp |
All |
All |
All |
All |
| Application |
Ntp |
Ntp |
All |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
- |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-beta1 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-beta2 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-beta3 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-beta4 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-beta5 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-rc1 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p1-rc2 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p2 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p2-rc1 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p2-rc2 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p2-rc3 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p3 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p3-rc1 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p3-rc2 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p3-rc3 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p4 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p5 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p6 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p7 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p8 |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p9 |
All |
All |
| Application |
Ntp |
Ntp |
4.3.0 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.1 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.10 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.11 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.12 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.13 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.14 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.15 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.16 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.17 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.18 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.19 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.2 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.20 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.21 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.22 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.23 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.24 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.25 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.26 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.27 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.28 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.29 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.3 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.30 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.31 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.32 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.33 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.34 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.35 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.36 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.37 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.38 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.39 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.4 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.40 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.41 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.42 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.43 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.44 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.45 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.46 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.47 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.48 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.49 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.5 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.50 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.51 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.52 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.53 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.54 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.55 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.56 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.57 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.58 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.59 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.6 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.60 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.61 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.62 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.63 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.64 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.65 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.66 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.67 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.68 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.69 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.7 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.70 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.71 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.72 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.73 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.74 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.75 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.76 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.77 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.78 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.79 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.8 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.80 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.81 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.82 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.83 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.84 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.85 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.86 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.87 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.88 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.89 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.9 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.90 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.91 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.92 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.93 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.2.8 |
p9 |
All |
All |
| Application |
Ntp |
Ntp |
4.3.0 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.1 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.10 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.11 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.12 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.13 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.14 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.15 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.16 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.17 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.18 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.19 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.2 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.20 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.21 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.22 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.23 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.24 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.25 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.26 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.27 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.28 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.29 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.3 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.30 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.31 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.32 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.33 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.34 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.35 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.36 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.37 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.38 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.39 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.4 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.40 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.41 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.42 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.43 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.44 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.45 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.46 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.47 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.48 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.49 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.5 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.50 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.51 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.52 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.53 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.54 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.55 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.56 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.57 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.58 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.59 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.6 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.60 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.61 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.62 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.63 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.64 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.65 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.66 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.67 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.68 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.69 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.7 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.70 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.71 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.72 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.73 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.74 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.75 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.76 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.77 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.78 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.79 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.8 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.80 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.81 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.82 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.83 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.84 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.85 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.86 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.87 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.88 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.89 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.9 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.90 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.91 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.92 |
All |
All |
All |
| Application |
Ntp |
Ntp |
4.3.93 |
All |
All |
All |
| Hardware |
Siemens |
Simatic Net Cp 443-1 Opc Ua |
- |
All |
All |
All |
| Operating System |
Siemens |
Simatic Net Cp 443-1 Opc Ua Firmware |
All |
All |
All |
All |
References
| Reference | Source | Link | Tags |
|---|
| Full Disclosure: APPLE-SA-2017-09-25-1 macOS High Sierra 10.13 |
FULLDISC |
seclists.org |
|
| support.ntp.org/bin/view/Main/SecurityNotice |
CONFIRM |
support.ntp.org |
Vendor Advisory |
| Siemens SIMATIC NET CP 443-1 OPC UA | CISA |
MISC |
us-cert.cisa.gov |
|
| [SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| [SECURITY] Fedora 26 Update: ntp-4.2.8p10-1.fc26 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| About the security content of macOS High Sierra 10.13 - Apple Support |
CONFIRM |
support.apple.com |
|
| Document Display | HPE Support Center |
CONFIRM |
support.hpe.com |
|
| cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf |
CONFIRM |
cert-portal.siemens.com |
|
| Slackware Security Advisory - ntp Updates ≈ Packet Storm |
MISC |
packetstormsecurity.com |
|
| USN-3349-1: NTP vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| [SECURITY] Fedora 25 Update: ntp-4.2.6p5-44.fc25 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Broadcom Support Portal |
CONFIRM |
bto.bluecoat.com |
|
| Full Disclosure: APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13 |
FULLDISC |
seclists.org |
|
| ntp Multiple Bugs Let Remote or Local Users Cause the Target Service to Crash - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 25 Update: ntp-4.2.6p5-44.fc25 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| support.f5.com/csp/article/K99254031 |
CONFIRM |
support.f5.com |
|
| [SECURITY] Fedora 24 Update: ntp-4.2.6p5-44.fc24 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| Broadcom Inc. | Connecting Everything |
CONFIRM |
www.broadcom.com |
|
| support.ntp.org/bin/view/Main/NtpBug3379 |
CONFIRM |
support.ntp.org |
Patch, Vendor Advisory |
| NTP CVE-2017-6458 Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [SECURITY] Fedora 24 Update: ntp-4.2.6p5-44.fc24 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| About the security content of macOS High Sierra 10.13 - Apple Support |
CONFIRM |
support.apple.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 44030 Juniper Network Operating System (Junos OS) Multiple NTP Vulnerabilities (JSA11171)
- 590736 Siemens SIMATIC NET CP 443-1 OPC UA Multiple Vulnerabilities (ICSA-21-159-11)