Note:
This project will be discontinued after December 13, 2021. [more]
2017-01-30
ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
Products | Ntp |
Type | Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) |
First patch | - None (likely due to unavailable code) |
Links |
• http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
• http://www.securitytracker.com/id/1035705 • http://www.securityfocus.com/bid/88204 • https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc • https://security.gentoo.org/glsa/201607-15 |