Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : ntp vulnerabilities (USN-777-1)

Ubuntu Security Notice (C) 2009-2013 Canonical, Inc. / NASL script (C) 2009-2013 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

A stack-based buffer overflow was discovered in ntpq. If a user were
tricked into connecting to a malicious ntp server, a remote attacker
could cause a denial of service in ntpq, or possibly execute arbitrary
code with the privileges of the user invoking the program.

Chris Ries discovered a stack-based overflow in ntp. If ntp was
configured to use autokey, a remote attacker could send a crafted
packet to cause a denial of service, or possibly execute arbitrary
code. (CVE-2009-1252).

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.0
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 38848 ()

Bugtraq ID: 35017

CVE ID: CVE-2009-0159