CVE-2017-6458

Published: 27 March 2017

Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.

Priority

Negligible

CVSS 3 base score: 8.8

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
Upstream
Released (1:4.2.8p10+dfsg-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1:4.2.8p10+dfsg-5ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1:4.2.8p10+dfsg-5ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1:4.2.8p10+dfsg-5ubuntu1)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1:4.2.8p4+dfsg-3ubuntu5.5)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.11)
Patches:
Upstream: http://bk1.ntp.org/ntp-stable/?PAGE=cset&REV=58a008c2PtxGYR8g6fLpoaFecrZ-zQ