First published: Tue Mar 17 2009(Updated: )
Apple Security Team reported a stack buffer overflow exists in the ntpq program. When the ntpq program is used to request peer information from a remote time server, a maliciously crafted response may lead to an unexpected application termination or arbitrary code execution. Problem exists in cookedprint() function in ntpq.c, when server-supplied numeric value is sprintf-ed to the buffer that is not large enough to hold string representation of the maximum possible value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP ntp | =4.2.2 | |
NTP ntp | =4.2.0 | |
NTP ntp | =4.2.4p5 | |
NTP ntp | =4.2.4p4 | |
NTP ntp | =4.0.98 | |
NTP ntp | =4.0.72 | |
NTP ntp | =4.2.4p2 | |
NTP ntp | =4.0.90 | |
NTP ntp | =4.0.96 | |
NTP ntp | =4.0.93 | |
NTP ntp | <=4.2.4p7 | |
NTP ntp | =4.1.0 | |
NTP ntp | =4.2.4p1 | |
NTP ntp | =4.1.2 | |
NTP ntp | =4.0.99 | |
NTP ntp | =4.0.95 | |
NTP ntp | =4.2.2p3 | |
NTP ntp | =4.2.2p2 | |
NTP ntp | =4.0.92 | |
NTP ntp | =4.0.73 | |
NTP ntp | =4.2.4p3 | |
NTP ntp | =4.0.97 | |
NTP ntp | =4.2.4 | |
NTP ntp | =4.2.2p4 | |
NTP ntp | =4.0.91 | |
NTP ntp | =4.2.2p1 | |
NTP ntp | =4.2.4p0 | |
NTP ntp | =4.0.94 | |
NTP ntp | =4.2.4p6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0159 is considered a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2009-0159, update to a version of the NTP software that is not affected, generally versions after 4.2.4p7.
CVE-2009-0159 affects multiple versions of NTP including 4.0.72, 4.0.98, and several others prior to the patched versions.
Yes, CVE-2009-0159 can be exploited remotely when the ntpq program interacts with a malicious time server.
CVE-2009-0159 could potentially allow attackers to execute arbitrary code and gain unauthorized access to affected systems.