CVE-2009-1252Improper Restriction of Operations within the Bounds of a Memory Buffer in NTP

Severity
6.8MEDIUMNVD
EPSS
70.2%
top 1.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateMay 3

Description

Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages8 packages

debiandebian/ntp< ntp 1:4.2.4p6+dfsg-2 (bullseye)
Debianntp/ntp< 1:4.2.4p6+dfsg-2
NVDntp/ntp78 versions+77
vmwarevmware/esxi

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x2p2-g54c-2jqg: Stack-based buffer overflow in the crypto_recv function in ntp_crypto2022-05-03
OSV
CVE-2009-1252: Stack-based buffer overflow in the crypto_recv function in ntp_crypto2009-05-19

📋Vendor Advisories

5
VMware
VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.2009-11-20
BSD
FreeBSD-SA-09:11.ntpd: ntpd stack-based buffer-overflow vulnerability2009-06-10
Ubuntu
Ntp vulnerabilities2009-05-19
Red Hat
ntp: remote arbitrary code execution vulnerability if autokeys is enabled2009-05-18
Debian
CVE-2009-1252: ntp - Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd ...2009

💬Community

1
Bugzilla
CVE-2009-1252 ntp: remote arbitrary code execution vulnerability if autokeys is enabled2009-05-07