Your submission was sent successfully! Close

CVE-2014-9295

Published: 19 December 2014

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.

Notes

AuthorNote
mdeslaur
configure() isn't in lucid
Priority

Medium

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
lucid
Released (1:4.2.4p8+dfsg-1ubuntu2.2)
precise
Released (1:4.2.6.p3+dfsg-1ubuntu3.2)
trusty
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.1)
upstream
Released (4.2.8)
utopic
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.10.1)
Patches:
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acc4dN1TbM1tRJrbPcA4yc1aTdA
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acdf3tUSFizXcv_X4b77Jt_Y-cg
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acf55dxKfhb6MuYQwzu8eDlS97g
This vulnerability is mitigated in part by an AppArmor profile. This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.