First published: Tue Oct 06 2015(Updated: )
ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | >=4.2.0<4.2.8 | |
NTP | =4.2.8 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9750 has been assigned a severity level that could lead to sensitive data exposure or denial of service.
To fix CVE-2014-9750, update your NTP software to version 4.2.8p1 or later.
CVE-2014-9750 affects NTP 4.x versions prior to 4.2.8p1 when Autokey Authentication is enabled.
CVE-2014-9750 allows remote attackers to exploit an invalid packet extension field, potentially leading to sensitive information disclosure or service interruptions.
CVE-2014-9750 is relevant for various Linux distributions, including Red Hat and Debian, particularly impacting specific versions.