CVE-2014-9295

Publication date 19 December 2014

Last updated 24 July 2024


Ubuntu priority

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.

Read the notes from the security team

Status

Package Ubuntu Release Status
ntp 14.10 utopic
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.10.1
14.04 LTS trusty
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1
12.04 LTS precise
Fixed 1:4.2.6.p3+dfsg-1ubuntu3.2
10.04 LTS lucid
Fixed 1:4.2.4p8+dfsg-1ubuntu2.2

Notes


mdeslaur

configure() isn't in lucid