Stack-based buffer overflow in the Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via an application path on the command line.
http://www.securitytracker.com/id/1038123
http://www.securityfocus.com/bid/97078
https://support.apple.com/HT208144
http://www.securitytracker.com/id/1039427
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
http://support.ntp.org/bin/view/Main/NtpBug3383
Source: Mitre, NVD
Published: 2017-03-27
Updated: 2025-04-20
Base Score: 4.6
Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00126