Bug 1098531 - (CVE-2018-12327) VUL-1: CVE-2018-12327: ntp: Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows anattacker to achieve code execution or escalate to higher privileges via a longstring as the argument for an IPv4 or IPv6 command-li
(CVE-2018-12327)
VUL-1: CVE-2018-12327: ntp: Stack-based buffer overflow in ntpq and ntpdc of ...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/208544/
CVSSv3:RedHat:CVE-2018-12327:7.0:(AV:...
:
Depends on:
Blocks: 1111853
  Show dependency treegraph
 
Reported: 2018-06-21 06:36 UTC by Marcus Meissner
Modified: 2019-04-27 22:27 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2018-06-21 06:36:30 UTC
CVE-2018-12327

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an
attacker to achieve code execution or escalate to higher privileges via a long
string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is
unclear whether there are any common situations in which ntpq or ntpdc is used
with a command line from an untrusted source.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12327
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-12327.html
https://gist.github.com/fakhrizulkifli/9b58ed8e0354e8deee50b0eebd1c011f
Comment 1 Marcus Meissner 2018-06-21 06:38:32 UTC
QA REPRODUCER:

/usr/sbin/ntpq -4 [`python -c 'print "A" * 300'`]

should not crash

also
/usr/sbin/ntpdc -4 [`python -c 'print "A" * 300'`]

should not crash
Comment 2 Marcus Meissner 2018-06-21 06:40:03 UTC
as the CVE entry said, that these are called with untrusted input is unlikely.

sle11 - not caught by overflow detection

sle12 and onwards: fstack-protector triggers and aborts the program
Comment 3 Reinhard Max 2018-09-11 10:57:01 UTC
ntp-4.2.8p12 is out, which contains a fix for this issue:
http://support.ntp.org/bin/view/Main/NtpBug3505
Comment 7 Swamp Workflow Management 2018-10-11 13:20:13 UTC
This is an autogenerated message for OBS integration:
This bug (1098531) was mentioned in
https://build.opensuse.org/request/show/640670 Factory / ntp
Comment 11 Reinhard Max 2018-10-15 14:49:10 UTC
All submissions done. They can be used for PTFs if necessary.
Comment 12 Swamp Workflow Management 2018-10-16 13:06:57 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2018-10-30.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/64156
Comment 13 Swamp Workflow Management 2018-10-23 19:13:25 UTC
SUSE-SU-2018:3342-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE OpenStack Cloud 7 (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Server 12-SP3 (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Server 12-SP2-BCL (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    ntp-4.2.8p12-64.8.2
SUSE Linux Enterprise Desktop 12-SP3 (src):    ntp-4.2.8p12-64.8.2
SUSE Enterprise Storage 4 (src):    ntp-4.2.8p12-64.8.2
SUSE CaaS Platform ALL (src):    ntp-4.2.8p12-64.8.2
SUSE CaaS Platform 3.0 (src):    ntp-4.2.8p12-64.8.2
Comment 14 Swamp Workflow Management 2018-10-23 19:21:52 UTC
SUSE-SU-2018:3351-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE Linux Enterprise Server 12-LTSS (src):    ntp-4.2.8p12-46.29.2
Comment 15 Swamp Workflow Management 2018-10-23 19:22:56 UTC
SUSE-SU-2018:3352-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    ntp-4.2.8p12-64.7.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    ntp-4.2.8p12-64.7.1
Comment 16 Swamp Workflow Management 2018-10-23 19:25:32 UTC
SUSE-SU-2018:3356-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    ntp-4.2.8p12-48.21.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    ntp-4.2.8p12-48.21.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    ntp-4.2.8p12-48.21.1
Comment 17 Swamp Workflow Management 2018-10-24 16:42:55 UTC
SUSE-SU-2018:3386-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE Linux Enterprise Module for Legacy Software 15 (src):    ntp-4.2.8p12-4.3.2
Comment 18 Swamp Workflow Management 2018-10-25 16:11:02 UTC
openSUSE-SU-2018:3438-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
openSUSE Leap 42.3 (src):    ntp-4.2.8p12-31.6.1
Comment 19 Swamp Workflow Management 2018-10-25 16:22:17 UTC
openSUSE-SU-2018:3452-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
openSUSE Leap 15.0 (src):    ntp-4.2.8p12-lp150.3.3.1
Comment 20 Marcus Meissner 2018-10-26 05:57:45 UTC
released
Comment 21 Swamp Workflow Management 2019-04-27 22:27:12 UTC
SUSE-SU-2018:3342-2: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1083424,1098531,1111853
CVE References: CVE-2018-12327,CVE-2018-7170
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    ntp-4.2.8p12-64.8.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.