CVE-2018-7185
Summary
| CVE | CVE-2018-7185 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-06 20:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 17.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 17.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Application | Hpe | Hpux-ntp | All | All | All | All |
| Application | Hpe | Hpux-ntp | All | All | All | All |
| Application | Netapp | Hci | - | All | All | All |
| Application | Netapp | Hci | - | All | All | All |
| Application | Netapp | Solidfire | - | All | All | All |
| Application | Netapp | Solidfire | - | All | All | All |
| Application | Ntp | Ntp | All | All | All | All |
| Application | Ntp | Ntp | 4.2.8 | - | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta4 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta5 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p10 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p4 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p5 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p6 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p7 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p8 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p9 | All | All |
| Application | Ntp | Ntp | All | All | All | All |
| Application | Ntp | Ntp | 4.2.8 | - | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta4 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-beta5 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p1-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p10 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p2-rc3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc1 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc2 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p3-rc3 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p4 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p5 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p6 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p7 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p8 | All | All |
| Application | Ntp | Ntp | 4.2.8 | p9 | All | All |
| Hardware | Oracle | Fujitsu M10-1 | - | All | All | All |
| Hardware | Oracle | Fujitsu M10-1 | - | All | All | All |
| Operating System | Oracle | Fujitsu M10-1 Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M10-1 Firmware | All | All | All | All |
| Hardware | Oracle | Fujitsu M10-4 | - | All | All | All |
| Hardware | Oracle | Fujitsu M10-4 | - | All | All | All |
| Hardware | Oracle | Fujitsu M10-4s | - | All | All | All |
| Hardware | Oracle | Fujitsu M10-4s | - | All | All | All |
| Operating System | Oracle | Fujitsu M10-4s Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M10-4s Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M10-4 Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M10-4 Firmware | All | All | All | All |
| Hardware | Oracle | Fujitsu M12-1 | - | All | All | All |
| Hardware | Oracle | Fujitsu M12-1 | - | All | All | All |
| Operating System | Oracle | Fujitsu M12-1 Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M12-1 Firmware | All | All | All | All |
| Hardware | Oracle | Fujitsu M12-2 | - | All | All | All |
| Hardware | Oracle | Fujitsu M12-2 | - | All | All | All |
| Hardware | Oracle | Fujitsu M12-2s | - | All | All | All |
| Hardware | Oracle | Fujitsu M12-2s | - | All | All | All |
| Operating System | Oracle | Fujitsu M12-2s Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M12-2s Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M12-2 Firmware | All | All | All | All |
| Operating System | Oracle | Fujitsu M12-2 Firmware | All | All | All | All |
| Application | Synology | Diskstation Manager | All | All | All | All |
| Application | Synology | Diskstation Manager | All | All | All | All |
| Application | Synology | Router Manager | All | All | All | All |
| Application | Synology | Router Manager | All | All | All | All |
| Application | Synology | Skynas | All | All | All | All |
| Application | Synology | Skynas | All | All | All | All |
| Application | Synology | Virtual Diskstation Manager | All | All | All | All |
| Application | Synology | Virtual Diskstation Manager | All | All | All | All |
| Hardware | Synology | Vs960hd | - | All | All | All |
| Hardware | Synology | Vs960hd | - | All | All | All |
| Operating System | Synology | Vs960hd Firmware | All | All | All | All |
| Operating System | Synology | Vs960hd Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| NTP CVE-2018-7185 Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Document Display | HPE Support Center | CONFIRM | support.hpe.com | Third Party Advisory |
| USN-3707-2: NTP vulnerabilities | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| NTP: Multiple vulnerabilities (GLSA 201805-12) — Gentoo security | GENTOO | security.gentoo.org | Third Party Advisory |
| support.ntp.org/bin/view/Main/NtpBug3454 | CONFIRM | support.ntp.org | Mitigation, Vendor Advisory |
| USN-3707-1: NTP vulnerabilities | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| March 2018 Network Time Protocol Daemon (ntpd) Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | Third Party Advisory |
| Slackware Security Advisory - ntp Updates ≈ Packet Storm | MISC | packetstormsecurity.com | Third Party Advisory, VDB Entry |
| Synology Inc. | CONFIRM | www.synology.com | Third Party Advisory |
| FreeBSD-SA-18:02 | FREEBSD | security.FreeBSD.org | Third Party Advisory |
| Oracle Critical Patch Update - October 2019 | MISC | www.oracle.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.