CVE-2014-9295
Published: 19 December 2014
Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
Priority
Status
Package | Release | Status |
---|---|---|
ntp Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.2.8)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.1)
|
|
Patches: Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acc4dN1TbM1tRJrbPcA4yc1aTdA Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acdf3tUSFizXcv_X4b77Jt_Y-cg Upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acf55dxKfhb6MuYQwzu8eDlS97g |
||
This vulnerability is mitigated in part by an AppArmor profile. This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |
Notes
Author | Note |
---|---|
mdeslaur | configure() isn't in lucid |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
- http://www.kb.cert.org/vuls/id/852879
- http://cwe.mitre.org/data/definitions/121.html
- http://support.ntp.org/bin/view/Main/SecurityNotice#Buffer_overflow_in_crypto_recv
- https://usn.ubuntu.com/usn/usn-2449-1
- NVD
- Launchpad
- Debian