Lucene search

K
ubuntucveUbuntu.comUB:CVE-2009-1252
HistoryMay 19, 2009 - 12:00 a.m.

CVE-2009-1252

2009-05-1900:00:00
ubuntu.com
ubuntu.com
11

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%

Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in
ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and
autokey are enabled, allows remote attackers to execute arbitrary code via
a crafted packet containing an extension field.

Notes

Author Note
jdstrand from CERT: If autokey is enabled (the ntp.conf file contains the line β€œcrypto pw whatever” a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow for malicious code to be executed with the privilege level of the ntpd process.
OSVersionArchitecturePackageVersionFilename
ubuntu6.06noarchntp<Β 1:4.2.0a+stable-8.1ubuntu6.2UNKNOWN
ubuntu8.04noarchntp<Β 1:4.2.4p4+dfsg-3ubuntu2.2UNKNOWN
ubuntu8.10noarchntp<Β 1:4.2.4p4+dfsg-6ubuntu2.3UNKNOWN
ubuntu9.04noarchntp<Β 1:4.2.4p4+dfsg-7ubuntu5.1UNKNOWN

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.964 High

EPSS

Percentile

99.5%