~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2009-1252

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2009-1252
2
 
PublicDate: 2009-05-19
3
 
References: 
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252
5
 
 https://usn.ubuntu.com/usn/usn-777-1
6
 
Description:
7
 
 Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in
8
 
 ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and
9
 
 autokey are enabled, allows remote attackers to execute arbitrary code via
10
 
 a crafted packet containing an extension field.
11
 
Ubuntu-Description: 
12
 
Notes: 
13
 
 jdstrand> from CERT: If autokey is enabled (the ntp.conf file contains the line           "crypto pw whatever" a remote attacker can send a carefully crafted             packet that can overflow a stack buffer and potentially allow for               malicious code to be executed with the privilege level of the ntpd              process.
14
 
Bugs: 
15
 
Priority: medium
16
 
Discovered-by: Chis Ries
17
 
Assigned-to: jdstrand
18
 
 
19
 
Patches_ntp:
20
 
upstream_ntp: pending (4.2.4p7, 4.2.5p74)
21
 
dapper_ntp: released (1:4.2.0a+stable-8.1ubuntu6.2)
22
 
hardy_ntp: released (1:4.2.4p4+dfsg-3ubuntu2.2)
23
 
intrepid_ntp: released (1:4.2.4p4+dfsg-6ubuntu2.3)
24
 
jaunty_ntp: released (1:4.2.4p4+dfsg-7ubuntu5.1)
25
 
devel_ntp: released (1:4.2.4p6+dfsg-1ubuntu2)
26