Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-26555
praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.005
EPSS Ranking
63.3%
CVSS Severity
CVSS v3 Score
6.4
References
https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506546409
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY2SVYH4MKPAXEYHCCXD3Z6VGINLSVHK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3VHEHHWCTYSB7HVJLYPVK4RPJZ5LX52/
https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506546409
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY2SVYH4MKPAXEYHCCXD3Z6VGINLSVHK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3VHEHHWCTYSB7HVJLYPVK4RPJZ5LX52/
Products affected by CVE-2023-26555
Ntp
»
Ntp
»
Version:
4.2.8
cpe:2.3:a:ntp:ntp:4.2.8
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved