Lucene search

K
ubuntuUbuntuUSN-777-1
HistoryMay 19, 2009 - 12:00 a.m.

Ntp vulnerabilities

2009-05-1900:00:00
ubuntu.com
33

8.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%

Releases

  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • ntp -

Details

A stack-based buffer overflow was discovered in ntpq. If a user were
tricked into connecting to a malicious ntp server, a remote attacker could
cause a denial of service in ntpq, or possibly execute arbitrary code with
the privileges of the user invoking the program. (CVE-2009-0159)

Chris Ries discovered a stack-based overflow in ntp. If ntp was configured
to use autokey, a remote attacker could send a crafted packet to cause a
denial of service, or possibly execute arbitrary code. (CVE-2009-1252)

OSVersionArchitecturePackageVersionFilename
Ubuntu9.04noarchntp< 1:4.2.4p4+dfsg-7ubuntu5.1UNKNOWN
Ubuntu9.04noarchntp< ate-1:4.2.4p4+dfsg-7ubuntu5.1UNKNOWN
Ubuntu8.10noarchntp< 1:4.2.4p4+dfsg-6ubuntu2.3UNKNOWN
Ubuntu8.10noarchntp< ate-1:4.2.4p4+dfsg-6ubuntu2.3UNKNOWN
Ubuntu8.04noarchntp< 1:4.2.4p4+dfsg-3ubuntu2.2UNKNOWN
Ubuntu8.04noarchntpdate< 1:4.2.4p4+dfsg-3ubuntu2.2UNKNOWN
Ubuntu6.06noarchntp-server< 1:4.2.0a+stable-8.1ubuntu6.2UNKNOWN
Ubuntu6.06noarchntp< 1:4.2.0a+stable-8.1ubuntu6.2UNKNOWN
Ubuntu6.06noarchntp< refclock-1:4.2.0a+stable-8.1ubuntu6.2UNKNOWN
Ubuntu6.06noarchntp< server-1:4.2.0a+stable-8.1ubuntu6.2UNKNOWN
Rows per page:
1-10 of 121

8.6 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%