First published: Fri Dec 19 2014(Updated: )
As per upstream NTP security advisory, multiple buffer overflows were reported in ntp daemon, details provided below * Buffer overflow in crypto_recv() When Autokey Authentication is enabled (i.e. the ntp.conf file contains a 'crypto pw ...' directive) a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process. This vulnerability was discovered by Stephen Roettger of the Google Security Team. Mitigation: Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the crypto keyword in your ntp.conf file. * Buffer overflow in ctl_putdata() A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process. This vulnerability was discovered by Stephen Roettger of the Google Security Team. * Buffer overflow in configure() A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process. This vulnerability was discovered by Stephen Roettger of the Google Security Team.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ntp | <4.2.8 | 4.2.8 |
NTP ntp | <=4.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9295 has been classified with a high severity due to its potential for remote code execution through buffer overflows.
To fix CVE-2014-9295, update the NTP daemon to version 4.2.8 or later where the vulnerabilities have been addressed.
CVE-2014-9295 affects NTP versions up to and including 4.2.7, and specifically instances where Autokey Authentication is enabled.
Yes, CVE-2014-9295 can be exploited remotely by attackers who can send specially crafted packets to the vulnerable NTP daemon.
Exploitation of CVE-2014-9295 can lead to buffer overflows that may result in remote code execution or denial of service.