CVE-2017-6460
Published: 27 March 2017
Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
Priority
CVSS 3 base score: 8.8
Status
Package | Release | Status |
---|---|---|
ntp Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not present)
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1:4.2.8p4+dfsg-3ubuntu5.5)
|
|
yakkety |
Released
(1:4.2.8p8+dfsg-1ubuntu2.1)
|
|
zesty |
Released
(1:4.2.8p9+dfsg-2ubuntu1.1)
|
|
Patches: upstream: http://bk1.ntp.org/ntp-stable/?PAGE=cset&REV=589f58574daOkdmCkyXNpBeidQfotw |