NTP BUG 1151: Remote exploit if autokey is enabled
Last update: January 15, 2024 18:03 UTC (83e32bc41)
Summary
Resolved |
Stable (4.2.4p7) Development (4.2.5p74) |
4 Mar 2009 10 Sep 2007 |
References |
Bug 1151 |
CVE-2009-1252 |
Affects |
All releases from 4.0.99m/4.1.70 (2001-08-15) through 4.2.4 before 4.2.4p7 and 4.2.5 before 4.2.5p74. |
Resolved in 4.2.4p7 and 4.2.5p74. |
CVSS2 Score |
6.8 |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
Description
When Autokey Authentication is enabled (i.e. the ntp.conf
file contains a crypto pw ...
directive) a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd
process.
Mitigation
- Upgrade to 4.2.4p7 or 4.2.5p74, or later.
- Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the
crypto
keyword in your ntp.conf
file.
Credit
This vulnerability was discovered by Chis Ries of CMU.
Timeline