Your submission was sent successfully! Close

CVE-2017-6460

Published: 27 March 2017

Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.

Priority

Low

CVSS 3 base score: 8.8

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
precise Not vulnerable
(code not present)
trusty Not vulnerable
(code not present)
upstream Needs triage

xenial
Released (1:4.2.8p4+dfsg-3ubuntu5.5)
yakkety
Released (1:4.2.8p8+dfsg-1ubuntu2.1)
zesty
Released (1:4.2.8p9+dfsg-2ubuntu1.1)
Patches:
upstream: http://bk1.ntp.org/ntp-stable/?PAGE=cset&REV=589f58574daOkdmCkyXNpBeidQfotw