First published: Tue Dec 08 2009(Updated: )
The Network Time Protocol (NTP) is used to synchronize a computer's time<br>with a referenced time source.<br>Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled<br>certain malformed NTP packets. ntpd logged information about all such<br>packets and replied with an NTP packet that was treated as malformed when<br>received by another ntpd. A remote attacker could use this flaw to create<br>an NTP packet reply loop between two ntpd servers via a malformed packet<br>with a spoofed source IP address and port, causing ntpd on those servers to<br>use excessive amounts of CPU time and fill disk space with log messages.<br>(CVE-2009-3563)<br>All ntp users are advised to upgrade to this updated package, which<br>contains a backported patch to resolve this issue. After installing the<br>update, the ntpd daemon will restart automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ntp | <4.2.2p1-9.el5_4.1 | 4.2.2p1-9.el5_4.1 |
redhat/ntp | <4.2.2p1-9.el5_4.1 | 4.2.2p1-9.el5_4.1 |
redhat/ntp | <4.2.0.a.20040617-8.el4_8.1 | 4.2.0.a.20040617-8.el4_8.1 |
redhat/ntp | <4.2.0.a.20040617-8.el4_8.1 | 4.2.0.a.20040617-8.el4_8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.