CVE-2017-6458

Priority
Description
Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10
and 4.3.x before 4.3.94 allow remote authenticated users to have
unspecified impact via a long variable.
Notes
mdeslaurThis is not a vulnerability per se, but a weakness in an
internal helper function
Package
Source: ntp (LP Ubuntu Debian)
Upstream:released (1:4.2.8p10+dfsg-1)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 ESM (Trusty Tahr):released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.11)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:4.2.8p4+dfsg-3ubuntu5.5)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1:4.2.8p10+dfsg-5ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:4.2.8p10+dfsg-5ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (1:4.2.8p10+dfsg-5ubuntu1)
Patches:
Upstream:http://bk1.ntp.org/ntp-stable/?PAGE=cset&REV=58a008c2PtxGYR8g6fLpoaFecrZ-zQ
More Information

Updated: 2020-04-24 03:43:24 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)