CVE-2009-0159

Publication date 14 April 2009

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

Read the notes from the security team

Status

Package Ubuntu Release Status
ntp 9.04 jaunty
Fixed 1:4.2.4p4+dfsg-7ubuntu5.1
8.10 intrepid
Fixed 1:4.2.4p4+dfsg-6ubuntu2.3
8.04 LTS hardy
Fixed 1:4.2.4p4+dfsg-3ubuntu2.2
7.10 gutsy Ignored end of life, was needed
6.06 LTS dapper
Fixed 1:4.2.0a+stable-8.1ubuntu6.2

Notes


kees

user-side (ntpq), 2 bytes, stack-only.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ntp

References

Related Ubuntu Security Notices (USN)

Other references