Oracle Solaris Installation, Booting and Patching (MOSC)

MOSC Banner

Security Vulnerability in Solaris 11.3 CVE-2018-12327

edited Jan 10, 2019 5:33AM in Oracle Solaris Installation, Booting and Patching (MOSC) 2 commentsAnswered ✓

Can anyone please guide how do I fix reported Vulnerability in Solaris 11.3 SPARC.

Description:

The detected version of NTP running on this host is known to be vulnerable to a Stack-based Buffer Overflow. Due to lack of sanitization on the input strings a local user might be able to crash the service, execute code or elevate its privileges in the context of the affected system by passing an specially crafted long string to the ntpdc and ntpq tools, which will call the openhost() method and result in the Buffer Overflow situation.

Upgrade NTP to the latest available version. This issue has been addressed in versions 4.2.8p12 and 4.3.94.

Tagged:

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center