CVE-2018-8956 PUBLISHED

ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.

EPSS 1.95% · 83.4th percentile

Risk Scores

EPSS Score
1.95%
83.4th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSntp1:4.2.8p4+dfsg-3ubuntu5.7, 1:4.2.8p4+dfsg-3ubuntu5.10, 1:4.2.8p4+dfsg-3ubuntu5.9
Ubuntu:Pro:20.04:LTSntp1:4.2.8p12+dfsg-3ubuntu2, 1:4.2.8p12+dfsg-3ubuntu4.20.04.1, 1:4.2.8p12+dfsg-3ubuntu4
Ubuntu:22.04:LTSntp1:4.2.8p15+dfsg-1ubuntu2, 1:4.2.8p15+dfsg-1ubuntu1, 1:4.2.8p12+dfsg-3ubuntu6
Ubuntu:Pro:14.04:LTSntp1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1, 0, 1:4.2.6.p5+dfsg-3ubuntu2
Ubuntu:Pro:18.04:LTSntp1:4.2.8p10+dfsg-5ubuntu7.1+esm1, 1:4.2.8p10+dfsg-5ubuntu7.1+esm2, 1:4.2.8p10+dfsg-5ubuntu7.2

Timeline

References

Open in Interactive Console →