CVE-2014-9295

Published: 19 December 2014

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.

Priority

Medium

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
Upstream
Released (4.2.8)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.1)
Patches:
Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acc4dN1TbM1tRJrbPcA4yc1aTdA
Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acdf3tUSFizXcv_X4b77Jt_Y-cg
Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acf55dxKfhb6MuYQwzu8eDlS97g
This vulnerability is mitigated in part by an AppArmor profile. This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.