Summary
This host is running NTP Daemon and is prone to stack overflow vulnerability.
Impact
Successful exploitation will let the attacker craft a specially malicious NTP request packet which can crash ntp daemon or can cause arbitrary code execution in the affected machine with local user's privilege.
Impact level: Application.
Solution
Apply the security update according to the OS version.
https://admin.fedoraproject.org/updates/search/ntp
Insight
This flaw is due to configuration error in ntp daemon's NTPv4 authentication code. If ntp daemon is configured to use Public Key Cryptography for NTP Packet authentication which lets the attacker send crafted NTP requests.
Affected
NTP version prior to 4.2.4p7
NTP version 4.2.5 to 4.2.5p73
References
Severity
Classification
-
CVE CVE-2009-1252 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AbsoluteFTP 'LIST' Command Remote Buffer Overflow Vulnerability
- Oracle MySQL 'COM_FIELD_LIST' Command Buffer Overflow Vulnerability
- UnrealIRCd User Authentication Buffer Overflow Vulnerability
- Yahoo Messenger JPG Photo Sharing Integer Overflow Vulnerability
- Trend Micro OfficeScan URL Filtering Engine Buffer Overflow Vulnerability