Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-5211 PoC — NTP monlist功能输入验证错误漏洞

Source
Associated Vulnerability
Title:NTP monlist功能输入验证错误漏洞 (CVE-2013-5211)
Description:The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
Readme
# CVE-2013-5211 PoC
## Network Time Protocol Daemon (ntpd) monlist Command Enabled DoS

This Python script is used to detect CVE-2013-5211, a vulnerability found in NTP (Network Time Protocol) servers. Using the ntpd monlist command, this vulnerability could allow an attacker to send a series of UDP packets to the server, consuming the server's resources.

The script sends a UDP packet to a user-specified NTP server and waits for a response from the server. If the server responds, the script indicates that it has the CVE-2013-5211 vulnerability. Otherwise, it is indicated that the server does not have this vulnerability.

```console
python3 CVE-2013-5211.py 192.168.x.x
```
File Snapshot

[4.0K] /data/pocs/c1d1cb870cbc3d344fda3856e877204ef40fb4c3 ├── [1.3K] CVE-2013-5211.py ├── [ 34K] LICENSE └── [ 682] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →