NTP BUG 3387: Authenticated DoS via Malicious Config Option
Last update: April 22, 2024 18:49 UTC (7e7bd5857)
Summary
Description
A vulnerability found in the NTP server allows an authenticated remote attacker to crash the daemon by sending an invalid setting via the :config
directive. The unpeer
option expects a number or an address as an argument. In case the value is 0
, a segmentation fault occurs.
Mitigation
- Implement BCP-38.
- Upgrade to 4.2.8p10 or later.
- Properly monitor your
ntpd
instances, and auto-restart ntpd
(without -g
) if it stops running.
Credit
This weakness was discovered by Cure53.
Timeline