CVE-2014-9751 (retired)

Priority
Description
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before
4.2.8p1 on Linux and OS X does not properly determine whether a source IP
address is an IPv6 loopback address, which makes it easier for remote
attackers to spoof restricted packets, and read or write to the runtime
state, by leveraging the ability to reach the ntpd machine's network
interface with a packet from the ::1 address.
Notes
 mdeslaur> this used to be known as CVE-2014-9298, patches were released
 mdeslaur> in USN-2497-1
Assigned-to
mdeslaur
More Information

Updated: 2019-08-23 09:05:03 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)