{"id":"UBUNTU-CVE-2023-26551","details":"mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp\u003ccpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.","modified":"2025-10-24T05:01:51Z","published":"2023-04-11T21:15:00Z","upstream":["CVE-2023-26551"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-26551"},{"type":"REPORT","url":"https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26551"},{"type":"REPORT","url":"https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506667321"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-26551"}],"affected":[{"package":{"name":"ntp","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu2","1:4.2.6.p5+dfsg-3ubuntu2.14.04.1","1:4.2.6.p5+dfsg-3ubuntu2.14.04.2","1:4.2.6.p5+dfsg-3ubuntu2.14.04.3","1:4.2.6.p5+dfsg-3ubuntu2.14.04.5","1:4.2.6.p5+dfsg-3ubuntu2.14.04.6","1:4.2.6.p5+dfsg-3ubuntu2.14.04.7","1:4.2.6.p5+dfsg-3ubuntu2.14.04.8","1:4.2.6.p5+dfsg-3ubuntu2.14.04.10","1:4.2.6.p5+dfsg-3ubuntu2.14.04.11","1:4.2.6.p5+dfsg-3ubuntu2.14.04.12","1:4.2.6.p5+dfsg-3ubuntu2.14.04.13","1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1","binary_name":"ntp"},{"binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1","binary_name":"ntpdate"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-26551.json"}},{"package":{"name":"ntp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p4+dfsg-3ubuntu5.10?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu8","1:4.2.6.p5+dfsg-3ubuntu8.1","1:4.2.6.p5+dfsg-3ubuntu9","1:4.2.8p4+dfsg-3ubuntu1","1:4.2.8p4+dfsg-3ubuntu2","1:4.2.8p4+dfsg-3ubuntu3","1:4.2.8p4+dfsg-3ubuntu4","1:4.2.8p4+dfsg-3ubuntu5","1:4.2.8p4+dfsg-3ubuntu5.1","1:4.2.8p4+dfsg-3ubuntu5.2","1:4.2.8p4+dfsg-3ubuntu5.3","1:4.2.8p4+dfsg-3ubuntu5.4","1:4.2.8p4+dfsg-3ubuntu5.5","1:4.2.8p4+dfsg-3ubuntu5.6","1:4.2.8p4+dfsg-3ubuntu5.7","1:4.2.8p4+dfsg-3ubuntu5.8","1:4.2.8p4+dfsg-3ubuntu5.9","1:4.2.8p4+dfsg-3ubuntu5.10"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.8p4+dfsg-3ubuntu5.10","binary_name":"ntp"},{"binary_version":"1:4.2.8p4+dfsg-3ubuntu5.10","binary_name":"ntpdate"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-26551.json"}},{"package":{"name":"ntp","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p10+dfsg-5ubuntu7.3+esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.2.8p10+dfsg-5ubuntu3","1:4.2.8p10+dfsg-5ubuntu4","1:4.2.8p10+dfsg-5ubuntu5","1:4.2.8p10+dfsg-5ubuntu6","1:4.2.8p10+dfsg-5ubuntu7","1:4.2.8p10+dfsg-5ubuntu7.1","1:4.2.8p10+dfsg-5ubuntu7.1+esm1","1:4.2.8p10+dfsg-5ubuntu7.1+esm2","1:4.2.8p10+dfsg-5ubuntu7.2","1:4.2.8p10+dfsg-5ubuntu7.2+esm1","1:4.2.8p10+dfsg-5ubuntu7.3","1:4.2.8p10+dfsg-5ubuntu7.3+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"ntp"},{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"ntpdate"},{"binary_version":"1:4.2.8p10+dfsg-5ubuntu7.3+esm1","binary_name":"sntp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-26551.json"}},{"package":{"name":"ntp","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.2.8p12+dfsg-3ubuntu2","1:4.2.8p12+dfsg-3ubuntu3","1:4.2.8p12+dfsg-3ubuntu4","1:4.2.8p12+dfsg-3ubuntu4.20.04.1","1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1","binary_name":"ntp"},{"binary_version":"1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1","binary_name":"ntpdate"},{"binary_version":"1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1","binary_name":"sntp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-26551.json"}},{"package":{"name":"ntp","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.8p15+dfsg-1ubuntu2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1:4.2.8p12+dfsg-3ubuntu6","1:4.2.8p15+dfsg-1ubuntu1","1:4.2.8p15+dfsg-1ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"1:4.2.8p15+dfsg-1ubuntu2","binary_name":"ntp"},{"binary_version":"1:4.2.8p15+dfsg-1ubuntu2","binary_name":"ntpdate"},{"binary_version":"1:4.2.8p15+dfsg-1ubuntu2","binary_name":"sntp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-26551.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"negligible"}]}