Summary
This host has NTP installed and is prone to stack buffer overflow vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code or to cause the application to crash.
Impact Level: Application.
Solution
Upgrade to NTP version 4.2.4p7-RC2
http://www.ntp.org/downloads.html
Insight
The flaw is due to a boundary error within the cookedprint() function in ntpq/ntpq.c while processing malicious response from a specially crafted remote time server.
Affected
NTP versions prior to 4.2.4p7-RC2 on Linux.
References
Severity
Classification
-
CVE CVE-2009-0159 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities