Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : ntp vulnerabilities (USN-777-1)

Ubuntu Security Notice (C) 2009-2013 Canonical, Inc. / NASL script (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

A stack-based buffer overflow was discovered in ntpq. If a user were
tricked into connecting to a malicious ntp server, a remote attacker
could cause a denial of service in ntpq, or possibly execute arbitrary
code with the privileges of the user invoking the program.
(CVE-2009-0159)

Chris Ries discovered a stack-based overflow in ntp. If ntp was
configured to use autokey, a remote attacker could send a crafted
packet to cause a denial of service, or possibly execute arbitrary
code. (CVE-2009-1252).

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.0
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 38848 ()

Bugtraq ID: 35017

CVE ID: CVE-2009-0159
CVE-2009-1252