Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2017-6458
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.049
EPSS Ranking
89.1%
CVSS Severity
CVSS v3 Score
8.8
CVSS v2 Score
6.5
References
http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
http://seclists.org/fulldisclosure/2017/Nov/7
http://seclists.org/fulldisclosure/2017/Sep/62
http://support.ntp.org/bin/view/Main/NtpBug3379
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
http://www.securityfocus.com/bid/97051
http://www.securitytracker.com/id/1038123
http://www.ubuntu.com/usn/USN-3349-1
https://bto.bluecoat.com/security-advisory/sa147
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
https://support.apple.com/HT208144
https://support.apple.com/kb/HT208144
https://support.f5.com/csp/article/K99254031
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
http://packetstormsecurity.com/files/142284/Slackware-Security-Advisory-ntp-Updates.html
http://seclists.org/fulldisclosure/2017/Nov/7
http://seclists.org/fulldisclosure/2017/Sep/62
http://support.ntp.org/bin/view/Main/NtpBug3379
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://www.securityfocus.com/archive/1/archive/1/540464/100/0/threaded
http://www.securityfocus.com/bid/97051
http://www.securitytracker.com/id/1038123
http://www.ubuntu.com/usn/USN-3349-1
https://bto.bluecoat.com/security-advisory/sa147
https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4B7BMVXV53EE7XYW2KAVETDHTP452O3Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KVLFA3J43QFIP4I7HE7KQ5FXSMJEKC6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZUPPICJXWL3AWQB7I3AWUC74YON7UING/
https://support.apple.com/HT208144
https://support.apple.com/kb/HT208144
https://support.f5.com/csp/article/K99254031
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-294/
Products affected by CVE-2017-6458
Hpe
»
Hpux-Ntp
»
Version:
N/A
cpe:2.3:a:hpe:hpux-ntp:-
Hpe
»
Hpux-Ntp
»
Version:
b.11.31
cpe:2.3:a:hpe:hpux-ntp:b.11.31
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.0.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.0.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.1.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.1.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.2.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.2.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.3.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.3.0
Ntp
»
Ntp
»
Version:
N/A
cpe:2.3:a:ntp:ntp:-
Ntp
»
Ntp
»
Version:
4.0
cpe:2.3:a:ntp:ntp:4.0
Ntp
»
Ntp
»
Version:
4.0.72
cpe:2.3:a:ntp:ntp:4.0.72
Ntp
»
Ntp
»
Version:
4.0.73
cpe:2.3:a:ntp:ntp:4.0.73
Ntp
»
Ntp
»
Version:
4.0.90
cpe:2.3:a:ntp:ntp:4.0.90
Ntp
»
Ntp
»
Version:
4.0.91
cpe:2.3:a:ntp:ntp:4.0.91
Ntp
»
Ntp
»
Version:
4.0.92
cpe:2.3:a:ntp:ntp:4.0.92
Ntp
»
Ntp
»
Version:
4.0.93
cpe:2.3:a:ntp:ntp:4.0.93
Ntp
»
Ntp
»
Version:
4.0.94
cpe:2.3:a:ntp:ntp:4.0.94
Ntp
»
Ntp
»
Version:
4.0.95
cpe:2.3:a:ntp:ntp:4.0.95
Ntp
»
Ntp
»
Version:
4.0.96
cpe:2.3:a:ntp:ntp:4.0.96
Ntp
»
Ntp
»
Version:
4.0.97
cpe:2.3:a:ntp:ntp:4.0.97
Ntp
»
Ntp
»
Version:
4.0.98
cpe:2.3:a:ntp:ntp:4.0.98
Ntp
»
Ntp
»
Version:
4.0.99
cpe:2.3:a:ntp:ntp:4.0.99
Ntp
»
Ntp
»
Version:
4.1.0
cpe:2.3:a:ntp:ntp:4.1.0
Ntp
»
Ntp
»
Version:
4.1.2
cpe:2.3:a:ntp:ntp:4.1.2
Ntp
»
Ntp
»
Version:
4.2.0
cpe:2.3:a:ntp:ntp:4.2.0
Ntp
»
Ntp
»
Version:
4.2.2
cpe:2.3:a:ntp:ntp:4.2.2
Ntp
»
Ntp
»
Version:
4.2.4
cpe:2.3:a:ntp:ntp:4.2.4
Ntp
»
Ntp
»
Version:
4.2.5
cpe:2.3:a:ntp:ntp:4.2.5
Ntp
»
Ntp
»
Version:
4.2.6
cpe:2.3:a:ntp:ntp:4.2.6
Ntp
»
Ntp
»
Version:
4.2.7
cpe:2.3:a:ntp:ntp:4.2.7
Ntp
»
Ntp
»
Version:
4.2.7p444
cpe:2.3:a:ntp:ntp:4.2.7p444
Ntp
»
Ntp
»
Version:
4.2.8
cpe:2.3:a:ntp:ntp:4.2.8
Ntp
»
Ntp
»
Version:
4.3.0
cpe:2.3:a:ntp:ntp:4.3.0
Ntp
»
Ntp
»
Version:
4.3.1
cpe:2.3:a:ntp:ntp:4.3.1
Ntp
»
Ntp
»
Version:
4.3.10
cpe:2.3:a:ntp:ntp:4.3.10
Ntp
»
Ntp
»
Version:
4.3.11
cpe:2.3:a:ntp:ntp:4.3.11
Ntp
»
Ntp
»
Version:
4.3.12
cpe:2.3:a:ntp:ntp:4.3.12
Ntp
»
Ntp
»
Version:
4.3.13
cpe:2.3:a:ntp:ntp:4.3.13
Ntp
»
Ntp
»
Version:
4.3.14
cpe:2.3:a:ntp:ntp:4.3.14
Ntp
»
Ntp
»
Version:
4.3.15
cpe:2.3:a:ntp:ntp:4.3.15
Ntp
»
Ntp
»
Version:
4.3.16
cpe:2.3:a:ntp:ntp:4.3.16
Ntp
»
Ntp
»
Version:
4.3.17
cpe:2.3:a:ntp:ntp:4.3.17
Ntp
»
Ntp
»
Version:
4.3.18
cpe:2.3:a:ntp:ntp:4.3.18
Ntp
»
Ntp
»
Version:
4.3.19
cpe:2.3:a:ntp:ntp:4.3.19
Ntp
»
Ntp
»
Version:
4.3.2
cpe:2.3:a:ntp:ntp:4.3.2
Ntp
»
Ntp
»
Version:
4.3.20
cpe:2.3:a:ntp:ntp:4.3.20
Ntp
»
Ntp
»
Version:
4.3.21
cpe:2.3:a:ntp:ntp:4.3.21
Ntp
»
Ntp
»
Version:
4.3.22
cpe:2.3:a:ntp:ntp:4.3.22
Ntp
»
Ntp
»
Version:
4.3.23
cpe:2.3:a:ntp:ntp:4.3.23
Ntp
»
Ntp
»
Version:
4.3.24
cpe:2.3:a:ntp:ntp:4.3.24
Ntp
»
Ntp
»
Version:
4.3.25
cpe:2.3:a:ntp:ntp:4.3.25
Ntp
»
Ntp
»
Version:
4.3.26
cpe:2.3:a:ntp:ntp:4.3.26
Ntp
»
Ntp
»
Version:
4.3.27
cpe:2.3:a:ntp:ntp:4.3.27
Ntp
»
Ntp
»
Version:
4.3.28
cpe:2.3:a:ntp:ntp:4.3.28
Ntp
»
Ntp
»
Version:
4.3.29
cpe:2.3:a:ntp:ntp:4.3.29
Ntp
»
Ntp
»
Version:
4.3.3
cpe:2.3:a:ntp:ntp:4.3.3
Ntp
»
Ntp
»
Version:
4.3.30
cpe:2.3:a:ntp:ntp:4.3.30
Ntp
»
Ntp
»
Version:
4.3.31
cpe:2.3:a:ntp:ntp:4.3.31
Ntp
»
Ntp
»
Version:
4.3.32
cpe:2.3:a:ntp:ntp:4.3.32
Ntp
»
Ntp
»
Version:
4.3.33
cpe:2.3:a:ntp:ntp:4.3.33
Ntp
»
Ntp
»
Version:
4.3.34
cpe:2.3:a:ntp:ntp:4.3.34
Ntp
»
Ntp
»
Version:
4.3.35
cpe:2.3:a:ntp:ntp:4.3.35
Ntp
»
Ntp
»
Version:
4.3.36
cpe:2.3:a:ntp:ntp:4.3.36
Ntp
»
Ntp
»
Version:
4.3.37
cpe:2.3:a:ntp:ntp:4.3.37
Ntp
»
Ntp
»
Version:
4.3.38
cpe:2.3:a:ntp:ntp:4.3.38
Ntp
»
Ntp
»
Version:
4.3.39
cpe:2.3:a:ntp:ntp:4.3.39
Ntp
»
Ntp
»
Version:
4.3.4
cpe:2.3:a:ntp:ntp:4.3.4
Ntp
»
Ntp
»
Version:
4.3.40
cpe:2.3:a:ntp:ntp:4.3.40
Ntp
»
Ntp
»
Version:
4.3.41
cpe:2.3:a:ntp:ntp:4.3.41
Ntp
»
Ntp
»
Version:
4.3.42
cpe:2.3:a:ntp:ntp:4.3.42
Ntp
»
Ntp
»
Version:
4.3.43
cpe:2.3:a:ntp:ntp:4.3.43
Ntp
»
Ntp
»
Version:
4.3.44
cpe:2.3:a:ntp:ntp:4.3.44
Ntp
»
Ntp
»
Version:
4.3.45
cpe:2.3:a:ntp:ntp:4.3.45
Ntp
»
Ntp
»
Version:
4.3.46
cpe:2.3:a:ntp:ntp:4.3.46
Ntp
»
Ntp
»
Version:
4.3.47
cpe:2.3:a:ntp:ntp:4.3.47
Ntp
»
Ntp
»
Version:
4.3.48
cpe:2.3:a:ntp:ntp:4.3.48
Ntp
»
Ntp
»
Version:
4.3.49
cpe:2.3:a:ntp:ntp:4.3.49
Ntp
»
Ntp
»
Version:
4.3.5
cpe:2.3:a:ntp:ntp:4.3.5
Ntp
»
Ntp
»
Version:
4.3.50
cpe:2.3:a:ntp:ntp:4.3.50
Ntp
»
Ntp
»
Version:
4.3.51
cpe:2.3:a:ntp:ntp:4.3.51
Ntp
»
Ntp
»
Version:
4.3.52
cpe:2.3:a:ntp:ntp:4.3.52
Ntp
»
Ntp
»
Version:
4.3.53
cpe:2.3:a:ntp:ntp:4.3.53
Ntp
»
Ntp
»
Version:
4.3.54
cpe:2.3:a:ntp:ntp:4.3.54
Ntp
»
Ntp
»
Version:
4.3.55
cpe:2.3:a:ntp:ntp:4.3.55
Ntp
»
Ntp
»
Version:
4.3.56
cpe:2.3:a:ntp:ntp:4.3.56
Ntp
»
Ntp
»
Version:
4.3.57
cpe:2.3:a:ntp:ntp:4.3.57
Ntp
»
Ntp
»
Version:
4.3.58
cpe:2.3:a:ntp:ntp:4.3.58
Ntp
»
Ntp
»
Version:
4.3.59
cpe:2.3:a:ntp:ntp:4.3.59
Ntp
»
Ntp
»
Version:
4.3.6
cpe:2.3:a:ntp:ntp:4.3.6
Ntp
»
Ntp
»
Version:
4.3.60
cpe:2.3:a:ntp:ntp:4.3.60
Ntp
»
Ntp
»
Version:
4.3.61
cpe:2.3:a:ntp:ntp:4.3.61
Ntp
»
Ntp
»
Version:
4.3.62
cpe:2.3:a:ntp:ntp:4.3.62
Ntp
»
Ntp
»
Version:
4.3.63
cpe:2.3:a:ntp:ntp:4.3.63
Ntp
»
Ntp
»
Version:
4.3.64
cpe:2.3:a:ntp:ntp:4.3.64
Ntp
»
Ntp
»
Version:
4.3.65
cpe:2.3:a:ntp:ntp:4.3.65
Ntp
»
Ntp
»
Version:
4.3.66
cpe:2.3:a:ntp:ntp:4.3.66
Ntp
»
Ntp
»
Version:
4.3.67
cpe:2.3:a:ntp:ntp:4.3.67
Ntp
»
Ntp
»
Version:
4.3.68
cpe:2.3:a:ntp:ntp:4.3.68
Ntp
»
Ntp
»
Version:
4.3.69
cpe:2.3:a:ntp:ntp:4.3.69
Ntp
»
Ntp
»
Version:
4.3.7
cpe:2.3:a:ntp:ntp:4.3.7
Ntp
»
Ntp
»
Version:
4.3.70
cpe:2.3:a:ntp:ntp:4.3.70
Ntp
»
Ntp
»
Version:
4.3.71
cpe:2.3:a:ntp:ntp:4.3.71
Ntp
»
Ntp
»
Version:
4.3.72
cpe:2.3:a:ntp:ntp:4.3.72
Ntp
»
Ntp
»
Version:
4.3.73
cpe:2.3:a:ntp:ntp:4.3.73
Ntp
»
Ntp
»
Version:
4.3.74
cpe:2.3:a:ntp:ntp:4.3.74
Ntp
»
Ntp
»
Version:
4.3.75
cpe:2.3:a:ntp:ntp:4.3.75
Ntp
»
Ntp
»
Version:
4.3.76
cpe:2.3:a:ntp:ntp:4.3.76
Ntp
»
Ntp
»
Version:
4.3.77
cpe:2.3:a:ntp:ntp:4.3.77
Ntp
»
Ntp
»
Version:
4.3.78
cpe:2.3:a:ntp:ntp:4.3.78
Ntp
»
Ntp
»
Version:
4.3.79
cpe:2.3:a:ntp:ntp:4.3.79
Ntp
»
Ntp
»
Version:
4.3.8
cpe:2.3:a:ntp:ntp:4.3.8
Ntp
»
Ntp
»
Version:
4.3.80
cpe:2.3:a:ntp:ntp:4.3.80
Ntp
»
Ntp
»
Version:
4.3.81
cpe:2.3:a:ntp:ntp:4.3.81
Ntp
»
Ntp
»
Version:
4.3.82
cpe:2.3:a:ntp:ntp:4.3.82
Ntp
»
Ntp
»
Version:
4.3.83
cpe:2.3:a:ntp:ntp:4.3.83
Ntp
»
Ntp
»
Version:
4.3.84
cpe:2.3:a:ntp:ntp:4.3.84
Ntp
»
Ntp
»
Version:
4.3.85
cpe:2.3:a:ntp:ntp:4.3.85
Ntp
»
Ntp
»
Version:
4.3.86
cpe:2.3:a:ntp:ntp:4.3.86
Ntp
»
Ntp
»
Version:
4.3.87
cpe:2.3:a:ntp:ntp:4.3.87
Ntp
»
Ntp
»
Version:
4.3.88
cpe:2.3:a:ntp:ntp:4.3.88
Ntp
»
Ntp
»
Version:
4.3.89
cpe:2.3:a:ntp:ntp:4.3.89
Ntp
»
Ntp
»
Version:
4.3.9
cpe:2.3:a:ntp:ntp:4.3.9
Ntp
»
Ntp
»
Version:
4.3.90
cpe:2.3:a:ntp:ntp:4.3.90
Ntp
»
Ntp
»
Version:
4.3.91
cpe:2.3:a:ntp:ntp:4.3.91
Ntp
»
Ntp
»
Version:
4.3.92
cpe:2.3:a:ntp:ntp:4.3.92
Ntp
»
Ntp
»
Version:
4.3.93
cpe:2.3:a:ntp:ntp:4.3.93
Siemens
»
Simatic Net Cp 443-1 Opc Ua
»
Version:
N/A
cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-
Apple
»
Mac Os X
»
Version:
10.10.0
cpe:2.3:o:apple:mac_os_x:10.10.0
Apple
»
Mac Os X
»
Version:
10.10.1
cpe:2.3:o:apple:mac_os_x:10.10.1
Apple
»
Mac Os X
»
Version:
10.10.2
cpe:2.3:o:apple:mac_os_x:10.10.2
Apple
»
Mac Os X
»
Version:
10.10.3
cpe:2.3:o:apple:mac_os_x:10.10.3
Apple
»
Mac Os X
»
Version:
10.10.4
cpe:2.3:o:apple:mac_os_x:10.10.4
Apple
»
Mac Os X
»
Version:
10.10.5
cpe:2.3:o:apple:mac_os_x:10.10.5
Apple
»
Mac Os X
»
Version:
10.11.0
cpe:2.3:o:apple:mac_os_x:10.11.0
Apple
»
Mac Os X
»
Version:
10.11.1
cpe:2.3:o:apple:mac_os_x:10.11.1
Apple
»
Mac Os X
»
Version:
10.11.2
cpe:2.3:o:apple:mac_os_x:10.11.2
Apple
»
Mac Os X
»
Version:
10.11.3
cpe:2.3:o:apple:mac_os_x:10.11.3
Apple
»
Mac Os X
»
Version:
10.11.4
cpe:2.3:o:apple:mac_os_x:10.11.4
Apple
»
Mac Os X
»
Version:
10.11.5
cpe:2.3:o:apple:mac_os_x:10.11.5
Apple
»
Mac Os X
»
Version:
10.11.6
cpe:2.3:o:apple:mac_os_x:10.11.6
Apple
»
Mac Os X
»
Version:
10.12
cpe:2.3:o:apple:mac_os_x:10.12
Apple
»
Mac Os X
»
Version:
10.12.0
cpe:2.3:o:apple:mac_os_x:10.12.0
Apple
»
Mac Os X
»
Version:
10.12.1
cpe:2.3:o:apple:mac_os_x:10.12.1
Apple
»
Mac Os X
»
Version:
10.12.2
cpe:2.3:o:apple:mac_os_x:10.12.2
Apple
»
Mac Os X
»
Version:
10.12.3
cpe:2.3:o:apple:mac_os_x:10.12.3
Apple
»
Mac Os X
»
Version:
10.12.4
cpe:2.3:o:apple:mac_os_x:10.12.4
Apple
»
Mac Os X
»
Version:
10.12.5
cpe:2.3:o:apple:mac_os_x:10.12.5
Apple
»
Mac Os X
»
Version:
10.12.6
cpe:2.3:o:apple:mac_os_x:10.12.6
Apple
»
Mac Os X
»
Version:
10.8.0
cpe:2.3:o:apple:mac_os_x:10.8.0
Apple
»
Mac Os X
»
Version:
10.8.1
cpe:2.3:o:apple:mac_os_x:10.8.1
Apple
»
Mac Os X
»
Version:
10.8.2
cpe:2.3:o:apple:mac_os_x:10.8.2
Apple
»
Mac Os X
»
Version:
10.8.3
cpe:2.3:o:apple:mac_os_x:10.8.3
Apple
»
Mac Os X
»
Version:
10.8.4
cpe:2.3:o:apple:mac_os_x:10.8.4
Apple
»
Mac Os X
»
Version:
10.8.5
cpe:2.3:o:apple:mac_os_x:10.8.5
Apple
»
Mac Os X
»
Version:
10.9
cpe:2.3:o:apple:mac_os_x:10.9
Apple
»
Mac Os X
»
Version:
10.9.1
cpe:2.3:o:apple:mac_os_x:10.9.1
Apple
»
Mac Os X
»
Version:
10.9.2
cpe:2.3:o:apple:mac_os_x:10.9.2
Apple
»
Mac Os X
»
Version:
10.9.3
cpe:2.3:o:apple:mac_os_x:10.9.3
Apple
»
Mac Os X
»
Version:
10.9.4
cpe:2.3:o:apple:mac_os_x:10.9.4
Apple
»
Mac Os X
»
Version:
10.9.5
cpe:2.3:o:apple:mac_os_x:10.9.5
Siemens
»
Simatic Net Cp 443-1 Opc Ua Firmware
»
Version:
N/A
cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:-
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved