
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was identified in NTP version 4.2.8p15, specifically in the mstolfp function within libntp/mstolfp.c. The vulnerability involves an out-of-bounds write operation when copying trailing numbers (NVD, CVE Mitre).
The vulnerability is classified as an out-of-bounds write (CWE-787) occurring in the mstolfp.c file at line 88. The CVSS v3.1 base score is 5.6 (Medium), with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating network accessibility with high attack complexity and no privileges required (NVD).
The vulnerability affects the libntp component, which serves as an upstream library that can impact various other components. While the vulnerability exists in the codebase, its impact is limited to the ntpq client process and does not affect the main ntpd daemon (GitHub Advisory).
As the vulnerability only affects the ntpq client tool and not the main ntpd daemon, the impact is considered less severe. Organizations should still consider updating to newer versions of NTP when available (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."