Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5211 PoC — NTP monlist功能输入验证错误漏洞

Source
Associated Vulnerability
Title:NTP monlist功能输入验证错误漏洞 (CVE-2013-5211)
Description:ntpd(Network Time Protocol daemon)是一个操作系统守护进程,它使用网络时间协议(NTP)与时间服务器的系统时间保持同步。 NTP 4.2.7p26之前的版本中的ntpd守护进程中的ntp_request.c文件中的monlist功能中存在输入验证漏洞。远程攻击者可通过伪造REQ_MON_GETLIST或REQ_MON_GETLIST_1请求利用该漏洞造成拒绝服务。
Description
NTP monlist scanner CVE-2013-5211
Readme
ntpscanner
==========

NTP monlist scanner CVE-2013-5211


This code is for educational and research purposes, do not use it for malicious purposes. 
File Snapshot

[4.0K] /data/pocs/d684590fadce9671de1024a4ff26445b32f31c49 ├── [ 10K] ntpscanner.c └── [ 150] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.