CVE-2018-7170 log

Severity High
Remote Yes
Type Content spoofing
ntpd can be vulnerable to Sybil attacks. If a system is set up to use a trustedkey and if one is not using the feature introduced in ntp-4.2.8p6 allowing an optional 4th field in the ntp.keys file to specify which IPs can serve time, a malicious authenticated peer -- i.e. one where the attacker knows the private symmetric key -- can create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock.
Group Package Affected Fixed Severity Status Ticket
AVG-647 ntp 4.2.8.p10-1 4.2.8.p11-1 High Fixed
Date Advisory Group Package Severity Type
16 Mar 2018 ASA-201803-11 AVG-647 ntp High multiple issues