{"id":"USN-4229-2","summary":"ntp vulnerability","details":"USN-4229-1 fixed a vulnerability in NTP. This update provides the\ncorresponding update for Ubuntu 18.04 ESM.\n\nOriginal advisory details:\n\n It was discovered that ntpq and ntpdc incorrectly handled some arguments.\n An attacker could possibly use this issue to cause ntpq or ntpdc to crash,\n execute arbitrary code, or escalate to higher privileges.\n","modified":"2026-02-10T04:41:45Z","published":"2021-03-15T22:24:29Z","related":["UBUNTU-CVE-2018-12327"],"upstream":["CVE-2018-12327","UBUNTU-CVE-2018-12327"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4229-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12327"}],"affected":[{"package":{"name":"ntp","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p10+dfsg-5ubuntu7.3+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1"}]}],"versions":["1:4.2.8p10+dfsg-5ubuntu3","1:4.2.8p10+dfsg-5ubuntu4","1:4.2.8p10+dfsg-5ubuntu5","1:4.2.8p10+dfsg-5ubuntu6","1:4.2.8p10+dfsg-5ubuntu7","1:4.2.8p10+dfsg-5ubuntu7.1","1:4.2.8p10+dfsg-5ubuntu7.1+esm1","1:4.2.8p10+dfsg-5ubuntu7.1+esm2","1:4.2.8p10+dfsg-5ubuntu7.2","1:4.2.8p10+dfsg-5ubuntu7.2+esm1","1:4.2.8p10+dfsg-5ubuntu7.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"ntp"},{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"ntpdate"},{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"sntp"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-12327","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4229-2.json"}}],"schema_version":"1.7.3"}