First published: Thu May 07 2009(Updated: )
CERT has reported a vulnerability in ntp (VU#853097). If autokey is enabled, a remote attacker can send a carefully crafted packet that can overflow a stack buffer, potentially allowing for the execution of arbitrary code with the privileges of the ntpd process. This is corrected upstream in versions 4.2.4p7 and 4.2.5p74, and affects ntp 4.2.4 (and possibly earlier). This issue can also be mitigated by ensuring autokey support is not enabled. By default, Red Hat Enterprise Linux defaults to running ntpd unprivileged with the ntpd user. This issue has been assigned <a href="https://access.redhat.com/security/cve/CVE-2009-1252">CVE-2009-1252</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
NTP | <4.2.4 | |
NTP | >=4.2.4<4.2.5p74 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The REDHAT-BUG-499694 vulnerability is classified as critical due to its potential for remote code execution.
To fix REDHAT-BUG-499694, upgrade NTP to versions that are above 4.2.5p74.
REDHAT-BUG-499694 can allow a remote attacker to execute arbitrary code with the privileges of the ntpd process.
If you are using NTP version 4.2.4 or any version between 4.2.4 and 4.2.5p74, your system is affected by REDHAT-BUG-499694.
The attack in REDHAT-BUG-499694 involves sending a specially crafted packet that can overflow a stack buffer.