First published: Tue Jul 13 2004(Updated: )
Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | <4.0 | |
Compaq Tru64 UNIX | =4.0f-patch_kit8 | |
Compaq Tru64 UNIX | =4.0g-patch_kit4 | |
Compaq Tru64 UNIX | =5.1b-patch_kit2 | |
Compaq Tru64 UNIX | =5.1b-patch_kit3 | |
Compaq Tru64 UNIX | =5.1b-patch_kit4 | |
Compaq Tru64 UNIX | =51.1a-patch_kit6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0657 has a moderate severity rating due to its potential to cause incorrect date/time responses from the NTP daemon.
To fix CVE-2004-0657, upgrade to NTP version 4.0 or later, which addresses the integer overflow issue.
CVE-2004-0657 affects versions of the NTP daemon before 4.0, including HP Tru64 Unix versions listed in the vulnerability details.
Exploiting CVE-2004-0657 can lead to clients receiving incorrect time data, potentially impacting time-sensitive applications and services.
While CVE-2004-0657 is an older vulnerability, systems still running affected versions of NTP may still be at risk.