Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-9295

Published: 19 December 2014

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.

Notes

AuthorNote
mdeslaur
configure() isn't in lucid

Priority

Medium

Status

Package Release Status
ntp
Launchpad, Ubuntu, Debian
lucid
Released (1:4.2.4p8+dfsg-1ubuntu2.2)
precise
Released (1:4.2.6.p3+dfsg-1ubuntu3.2)
trusty
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.1)
upstream
Released (4.2.8)
utopic
Released (1:4.2.6.p5+dfsg-3ubuntu2.14.10.1)
Patches:
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acc4dN1TbM1tRJrbPcA4yc1aTdA
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acdf3tUSFizXcv_X4b77Jt_Y-cg
upstream: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=548acf55dxKfhb6MuYQwzu8eDlS97g
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. This vulnerability is mitigated in part by an AppArmor profile.