ntp
- Author: Miklos Vajna
- Vulnerable: 4.2.4p6-1
- Unaffected: 4.2.4p7-1anacreon1
A vulnerability has been reported in NTP, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerability is caused due to a boundary error within the “crypto_recv()” function in ntpd/ntp_crypto.c. This can be exploited to cause a stack-based buffer overflow via a specially crafted packet sent to the “ntpd”. Successful exploitation allows execution of arbitrary code, but requires that Autokey Authentication is configured via “crypto pw [password]” in ntp.conf.