Network Time Protocol Daemon (ntpd) readvar Variable Overflow RCE

critical Nessus Plugin ID 10647

Synopsis

The remote NTP server is affected by a remote code execution vulnerability.

Description

The remote NTP server is affected by a buffer overflow condition due to improper bounds checking on the 'readvar' argument. An unauthenticated, remote attacker can exploit this, via a specially crafted request that uses an overly long argument, to execute arbitrary code with root privileges.

Solution

Disable this service if you do not use it, or check with the vendor for an upgrade to a fixed version.

Plugin Details

Severity: Critical

ID: 10647

File Name: ntp_overflow.nasl

Version: 1.38

Type: remote

Published: 4/10/2001

Updated: 7/17/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ntp:ntp

Required KB Items: Settings/ParanoidReport, NTP/Running

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 4/4/2001

Exploitable With

Metasploit (NTP Daemon readvar Buffer Overflow)

Reference Information

CVE: CVE-2001-0414

BID: 2540

CERT: 970472