This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200905-08
(NTP: Remote execution of arbitrary code)
Multiple vulnerabilities have been found in the programs included in
the NTP package:
Apple Product Security reported a
boundary error in the cookedprint() function in ntpq/ntpq.c, possibly
leading to a stack-based buffer overflow (CVE-2009-0159).
Chris Ries of CMU reported a boundary error within the
crypto_recv() function in ntpd/ntp_crypto.c, possibly leading to a
stack-based buffer overflow (CVE-2009-1252).
A remote attacker might send a specially crafted package to a machine
running ntpd, possibly resulting in the remote execution of arbitrary
code with the privileges of the user running the daemon, or a Denial of
Service. NOTE: Successful exploitation requires the 'autokey' feature
to be enabled. This feature is only available if NTP was built with the
'ssl' USE flag.
Furthermore, a remote attacker could entice a user into connecting to a
malicious server using ntpq, possibly resulting in the remote execution
of arbitrary code with the privileges of the user running the
application, or a Denial of Service.
You can protect against CVE-2009-1252 by disabling the 'ssl' USE flag
and recompiling NTP.
See also :
All NTP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-misc/ntp-4.2.4_p7'
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Gentoo Local Security Checks
Nessus Plugin ID: 38920 (gentoo_GLSA-200905-08.nasl)
Bugtraq ID: 3448135017
CVE ID: CVE-2009-0159CVE-2009-1252
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.