Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-8936
NTP through 4.2.8p12 has a NULL Pointer Dereference.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.087
EPSS Ranking
92.0%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://bugs.ntp.org/show_bug.cgi?id=3565
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html
http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html
http://support.ntp.org/bin/view/Main/SecurityNotice
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/
https://seclists.org/bugtraq/2019/May/39
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc
https://security.gentoo.org/glsa/201903-15
https://security.netapp.com/advisory/ntap-20190503-0001/
https://support.f5.com/csp/article/K61363039
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://usn.ubuntu.com/4563-1/
http://bugs.ntp.org/show_bug.cgi?id=3565
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html
http://packetstormsecurity.com/files/152915/FreeBSD-Security-Advisory-FreeBSD-SA-19-04.ntp.html
http://support.ntp.org/bin/view/Main/SecurityNotice
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NVS2CSG2TQ663CXOZZUJN4STQPMENNP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBGXY7OKWOLT6X6JAPVZRFEP4FLCGGST/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQDNHNYOJK2SRSGO23GQ2RXTOUY2HLNN/
https://seclists.org/bugtraq/2019/May/39
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:04.ntp.asc
https://security.gentoo.org/glsa/201903-15
https://security.netapp.com/advisory/ntap-20190503-0001/
https://support.f5.com/csp/article/K61363039
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us
https://usn.ubuntu.com/4563-1/
Products affected by CVE-2019-8936
Hpe
»
Hpux-Ntp
»
Version:
N/A
cpe:2.3:a:hpe:hpux-ntp:-
Hpe
»
Hpux-Ntp
»
Version:
b.11.31
cpe:2.3:a:hpe:hpux-ntp:b.11.31
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.0.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.0.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.1.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.1.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.2.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.2.0
Hpe
»
Hpux-Ntp
»
Version:
c.4.2.8.3.0
cpe:2.3:a:hpe:hpux-ntp:c.4.2.8.3.0
Ntp
»
Ntp
»
Version:
N/A
cpe:2.3:a:ntp:ntp:-
Ntp
»
Ntp
»
Version:
4.0
cpe:2.3:a:ntp:ntp:4.0
Ntp
»
Ntp
»
Version:
4.0.72
cpe:2.3:a:ntp:ntp:4.0.72
Ntp
»
Ntp
»
Version:
4.0.73
cpe:2.3:a:ntp:ntp:4.0.73
Ntp
»
Ntp
»
Version:
4.0.90
cpe:2.3:a:ntp:ntp:4.0.90
Ntp
»
Ntp
»
Version:
4.0.91
cpe:2.3:a:ntp:ntp:4.0.91
Ntp
»
Ntp
»
Version:
4.0.92
cpe:2.3:a:ntp:ntp:4.0.92
Ntp
»
Ntp
»
Version:
4.0.93
cpe:2.3:a:ntp:ntp:4.0.93
Ntp
»
Ntp
»
Version:
4.0.94
cpe:2.3:a:ntp:ntp:4.0.94
Ntp
»
Ntp
»
Version:
4.0.95
cpe:2.3:a:ntp:ntp:4.0.95
Ntp
»
Ntp
»
Version:
4.0.96
cpe:2.3:a:ntp:ntp:4.0.96
Ntp
»
Ntp
»
Version:
4.0.97
cpe:2.3:a:ntp:ntp:4.0.97
Ntp
»
Ntp
»
Version:
4.0.98
cpe:2.3:a:ntp:ntp:4.0.98
Ntp
»
Ntp
»
Version:
4.0.99
cpe:2.3:a:ntp:ntp:4.0.99
Ntp
»
Ntp
»
Version:
4.1.0
cpe:2.3:a:ntp:ntp:4.1.0
Ntp
»
Ntp
»
Version:
4.1.2
cpe:2.3:a:ntp:ntp:4.1.2
Ntp
»
Ntp
»
Version:
4.2.0
cpe:2.3:a:ntp:ntp:4.2.0
Ntp
»
Ntp
»
Version:
4.2.2
cpe:2.3:a:ntp:ntp:4.2.2
Ntp
»
Ntp
»
Version:
4.2.4
cpe:2.3:a:ntp:ntp:4.2.4
Ntp
»
Ntp
»
Version:
4.2.5
cpe:2.3:a:ntp:ntp:4.2.5
Ntp
»
Ntp
»
Version:
4.2.6
cpe:2.3:a:ntp:ntp:4.2.6
Ntp
»
Ntp
»
Version:
4.2.7
cpe:2.3:a:ntp:ntp:4.2.7
Ntp
»
Ntp
»
Version:
4.2.7p444
cpe:2.3:a:ntp:ntp:4.2.7p444
Ntp
»
Ntp
»
Version:
4.2.8
cpe:2.3:a:ntp:ntp:4.2.8
Fedoraproject
»
Fedora
»
Version:
28
cpe:2.3:o:fedoraproject:fedora:28
Fedoraproject
»
Fedora
»
Version:
29
cpe:2.3:o:fedoraproject:fedora:29
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Netapp
»
Clustered Data Ontap
»
Version:
N/A
cpe:2.3:o:netapp:clustered_data_ontap:-
Netapp
»
Clustered Data Ontap
»
Version:
8.2
cpe:2.3:o:netapp:clustered_data_ontap:8.2
Netapp
»
Clustered Data Ontap
»
Version:
8.3
cpe:2.3:o:netapp:clustered_data_ontap:8.3
Netapp
»
Clustered Data Ontap
»
Version:
9.0
cpe:2.3:o:netapp:clustered_data_ontap:9.0
Netapp
»
Clustered Data Ontap
»
Version:
9.1
cpe:2.3:o:netapp:clustered_data_ontap:9.1
Netapp
»
Data Ontap
»
Version:
N/A
cpe:2.3:o:netapp:data_ontap:-
Opensuse
»
Leap
»
Version:
15.0
cpe:2.3:o:opensuse:leap:15.0
Opensuse
»
Leap
»
Version:
42.3
cpe:2.3:o:opensuse:leap:42.3
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved