1
Candidate: CVE-2009-1252
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252
5
https://usn.ubuntu.com/usn/usn-777-1
7
Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in
8
ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and
9
autokey are enabled, allows remote attackers to execute arbitrary code via
10
a crafted packet containing an extension field.
13
jdstrand> from CERT: If autokey is enabled (the ntp.conf file contains the line "crypto pw whatever" a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow for malicious code to be executed with the privilege level of the ntpd process.
16
Discovered-by: Chis Ries
20
upstream_ntp: pending (4.2.4p7, 4.2.5p74)
21
dapper_ntp: released (1:4.2.0a+stable-8.1ubuntu6.2)
22
hardy_ntp: released (1:4.2.4p4+dfsg-3ubuntu2.2)
23
intrepid_ntp: released (1:4.2.4p4+dfsg-6ubuntu2.3)
24
jaunty_ntp: released (1:4.2.4p4+dfsg-7ubuntu5.1)
25
devel_ntp: released (1:4.2.4p6+dfsg-1ubuntu2)