{"api_version":"1","generated_at":"2026-04-23T09:36:28+00:00","cve":"CVE-2013-5211","urls":{"html":"https://cve.report/CVE-2013-5211","api":"https://cve.report/api/cve/CVE-2013-5211.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2013-5211","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2013-5211"},"summary":{"title":"CVE-2013-5211","description":"The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2014-01-02 14:59:00","updated_at":"2023-11-01 12:51:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"http://www.kb.cert.org/vuls/id/348126","name":"VU#348126","refsource":"CERT-VN","tags":["Third Party Advisory","US Government Resource"],"title":"Vulnerability Note VU#348126 - NTP can be abused to amplify denial-of-service attack traffic","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html","name":"openSUSE-SU-2014:1149","refsource":"SUSE","tags":[],"title":"openSUSE-SU-2014:1149-1: moderate: Avoid ntp being used as a DDoS amplif","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","refsource":"CONFIRM","tags":[],"title":"Oracle Linux Bulletin - July 2016","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://openwall.com/lists/oss-security/2013/12/30/6","name":"[oss-security] 20131230 CVE to the ntp monlist DDoS issue?","refsource":"MLIST","tags":[],"title":"oss-security - CVE to the ntp monlist DDoS issue?","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59726","name":"59726","refsource":"SECUNIA","tags":[],"title":"Security Advisory SA59726 - IBM Flex System Manager Node (FSM) NTP Mode 7 Denial of Service Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","name":"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","refsource":"CONFIRM","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232","refsource":"CONFIRM","tags":[],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.ntp.org/pipermail/pool/2011-December/005616.html","name":"[pool] 20111210 Odd surge in traffic today","refsource":"MLIST","tags":[],"title":"[Pool] Odd surge in traffic today","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/59288","name":"59288","refsource":"SECUNIA","tags":[],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory","name":"https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory","refsource":"CONFIRM","tags":[],"title":"Advisory: puppetlabs-ntp default configuration does not fully mitigate CVE-2013-5211 | Puppet","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://openwall.com/lists/oss-security/2013/12/30/7","name":"[oss-security] 20131230 Re: CVE to the ntp monlist DDoS issue?","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE to the ntp monlist DDoS issue?","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=144182594518755&w=2","name":"HPSBOV03505","refsource":"HP","tags":[],"title":"'[security bulletin] HPSBOV03505 rev.1 - TCP/IP Services for OpenVMS running NTP, Remote Code Executi' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04","name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"NTP Reflection Attack | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/64692","name":"64692","refsource":"BID","tags":[],"title":"NTP 'ntp_request.c' Remote Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securitytracker.com/id/1030433","name":"1030433","refsource":"SECTRACK","tags":[],"title":"IBM AIX ntpd Query Function Lets Remote Users Conduct Amplified Denial of Service Attacks - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861","refsource":"CONFIRM","tags":[],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892","name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892","refsource":"CONFIRM","tags":[],"title":"IBM Support","mime":"text/html","httpstatus":"200","archivestatus":"403"},{"url":"http://www.us-cert.gov/ncas/alerts/TA14-013A","name":"TA14-013A","refsource":"CERT","tags":["Third Party Advisory","US Government Resource"],"title":"NTP Amplification Attacks Using CVE-2013-5211 | US-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=138971294629419&w=2","name":"HPSBUX02960","refsource":"HP","tags":[],"title":"'[security bulletin] HPSBUX02960 SSRT101419 rev.1 - HP-UX Running NTP, Remote Denial of Service (DoS)' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://bugs.ntp.org/show_bug.cgi?id=1532","name":"http://bugs.ntp.org/show_bug.cgi?id=1532","refsource":"CONFIRM","tags":[],"title":"Bug 1532 – remove ntpd support for ntpdc's monlist (use ntpq's mrulist)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz","name":"http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz","refsource":"CONFIRM","tags":["Patch"],"title":"","mime":"application/gzip","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2013-5211","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-5211","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p10","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p11","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p12","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p13","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p14","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p15","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p16","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p17","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p18","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p19","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p20","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p21","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p22","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p23","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p24","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p25","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p6","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p7","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p8","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"p9","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ntp","cpe5":"ntp","cpe6":"4.2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"11.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"opensuse","cpe6":"11.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"6","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2013","cve_id":"5211","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"7","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2013-5211","qid":"352837","title":"Amazon Linux Security Advisory for ntp: ALAS2-2021-1706"},{"cve":"CVE-2013-5211","qid":"44030","title":"Juniper Network Operating System (Junos OS) Multiple NTP Vulnerabilities (JSA11171)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2013-5211","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"59288","refsource":"SECUNIA","url":"http://secunia.com/advisories/59288"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232"},{"name":"openSUSE-SU-2014:1149","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html"},{"name":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"name":"HPSBUX02960","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=138971294629419&w=2"},{"name":"TA14-013A","refsource":"CERT","url":"http://www.us-cert.gov/ncas/alerts/TA14-013A"},{"name":"64692","refsource":"BID","url":"http://www.securityfocus.com/bid/64692"},{"name":"VU#348126","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/348126"},{"name":"HPSBOV03505","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=144182594518755&w=2"},{"name":"[oss-security] 20131230 CVE to the ntp monlist DDoS issue?","refsource":"MLIST","url":"http://openwall.com/lists/oss-security/2013/12/30/6"},{"name":"59726","refsource":"SECUNIA","url":"http://secunia.com/advisories/59726"},{"name":"1030433","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1030433"},{"name":"http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz","refsource":"CONFIRM","url":"http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz"},{"name":"http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04","refsource":"MISC","url":"http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04"},{"name":"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","refsource":"CONFIRM","url":"http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861"},{"name":"[pool] 20111210 Odd surge in traffic today","refsource":"MLIST","url":"http://lists.ntp.org/pipermail/pool/2011-December/005616.html"},{"name":"[oss-security] 20131230 Re: CVE to the ntp monlist DDoS issue?","refsource":"MLIST","url":"http://openwall.com/lists/oss-security/2013/12/30/7"},{"name":"SSRT101419","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=138971294629419&w=2"},{"name":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892","refsource":"CONFIRM","url":"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892"},{"name":"http://bugs.ntp.org/show_bug.cgi?id=1532","refsource":"CONFIRM","url":"http://bugs.ntp.org/show_bug.cgi?id=1532"},{"name":"https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory","refsource":"CONFIRM","url":"https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory"}]}},"nvd":{"publishedDate":"2014-01-02 14:59:00","lastModifiedDate":"2023-11-01 12:51:00","problem_types":["CWE-20"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p22:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p15:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p21:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p13:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p18:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p4:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p10:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p20:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p6:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p19:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p7:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p12:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p14:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p9:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p24:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p25:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p8:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p11:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p5:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p17:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p16:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p0:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:p23:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:4.2.7:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*","versionEndExcluding":"4.2.7","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2013","CveId":"5211","Ordinal":"64890","Title":"CVE-2013-5211","CVE":"CVE-2013-5211","Year":"2013"},"notes":[{"CveYear":"2013","CveId":"5211","Ordinal":"1","NoteData":"The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.","Type":"Description","Title":null},{"CveYear":"2013","CveId":"5211","Ordinal":"2","NoteData":"2014-01-02","Type":"Other","Title":"Published"},{"CveYear":"2013","CveId":"5211","Ordinal":"3","NoteData":"2017-12-08","Type":"Other","Title":"Modified"}]}}}