### [CVE-2013-5211](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013. ### POC #### Reference - http://www.kb.cert.org/vuls/id/348126 - http://www.kb.cert.org/vuls/id/348126 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html #### Github - https://github.com/0xhav0c/CVE-2013-5211 - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/JERRY123S/all-poc - https://github.com/bubalush/task1_community - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/danghh-1998/ddos_attack - https://github.com/dani87/ntpscanner - https://github.com/gvancuts/resilient-edge - https://github.com/hktalent/TOP - https://github.com/jbmihoub/all-poc - https://github.com/puppetlabs/puppetlabs-compliance_profile - https://github.com/sepehrdaddev/ntpdos - https://github.com/suedadam/ntpscanner - https://github.com/trzmjel/open_relay_udp_amp - https://github.com/ugurbzkrt/pentest-py - https://github.com/weeka10/-hktalent-TOP - https://github.com/xubyxiaobao/docker-cluster