First published: Tue Mar 17 2009(Updated: )
Apple Security Team reported a stack buffer overflow exists in the ntpq program. When the ntpq program is used to request peer information from a remote time server, a maliciously crafted response may lead to an unexpected application termination or arbitrary code execution. Problem exists in cookedprint() function in ntpq.c, when server-supplied numeric value is sprintf-ed to the buffer that is not large enough to hold string representation of the maximum possible value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | =4.2.2 | |
NTP ntp | =4.2.0 | |
NTP ntp | =4.2.4p5 | |
NTP ntp | =4.2.4p4 | |
NTP ntp | =4.0.98 | |
NTP ntp | =4.0.72 | |
NTP ntp | =4.2.4p2 | |
NTP ntp | =4.0.90 | |
NTP ntp | =4.0.96 | |
NTP ntp | =4.0.93 | |
NTP ntp | <=4.2.4p7 | |
NTP ntp | =4.1.0 | |
NTP ntp | =4.2.4p1 | |
NTP ntp | =4.1.2 | |
NTP ntp | =4.0.99 | |
NTP ntp | =4.0.95 | |
NTP ntp | =4.2.2p3 | |
NTP ntp | =4.2.2p2 | |
NTP ntp | =4.0.92 | |
NTP ntp | =4.0.73 | |
NTP ntp | =4.2.4p3 | |
NTP ntp | =4.0.97 | |
NTP ntp | =4.2.4 | |
NTP ntp | =4.2.2p4 | |
NTP ntp | =4.0.91 | |
NTP ntp | =4.2.2p1 | |
NTP ntp | =4.2.4p0 | |
NTP ntp | =4.0.94 | |
NTP ntp | =4.2.4p6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.