
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in NTP version 4.2.8p15, specifically in the mstolfp function within libntp/mstolfp.c. The vulnerability is characterized by an out-of-bounds write condition in the cp<cpdec while loop. This security flaw affects the libntp component, which serves as an upstream library that can impact various other components (GitHub CVE).
The vulnerability is classified as a buffer overflow error, specifically located in mstolfp.c:83. The issue resides in the libntp component, which is a fundamental library used by NTP-related tools. Importantly, while this vulnerability exists in a shared library component, it specifically affects the ntpq process rather than the main ntpd daemon (GitHub Issue).
The vulnerability can potentially lead to code execution and denial of service conditions. The impact is primarily limited to the ntpq utility, which is a query tool for NTP servers, rather than affecting the core ntpd service (GitHub CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."