First published: Tue Dec 08 2009(Updated: )
The Network Time Protocol (NTP) is used to synchronize a computer's time<br>with a referenced time source.<br>Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled<br>certain malformed NTP packets. ntpd logged information about all such<br>packets and replied with an NTP packet that was treated as malformed when<br>received by another ntpd. A remote attacker could use this flaw to create<br>an NTP packet reply loop between two ntpd servers via a malformed packet<br>with a spoofed source IP address and port, causing ntpd on those servers to<br>use excessive amounts of CPU time and fill disk space with log messages.<br>(CVE-2009-3563)<br>A buffer overflow flaw was found in the ntpq diagnostic command. A<br>malicious, remote server could send a specially-crafted reply to an ntpq<br>request that could crash ntpq or, potentially, execute arbitrary code with<br>the privileges of the user running the ntpq command. (CVE-2009-0159)<br>All ntp users are advised to upgrade to this updated package, which<br>contains backported patches to resolve these issues. After installing the<br>update, the ntpd daemon will restart automatically.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.