Description Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
CVSS vector AV:N/AC:L/C:P/I:P/A:P Exploitability: 10.0 | Impact: 6.4 Affected Packages5 packages ▶ debian debian/ntp < ntp 1:4.2.6.p5+dfsg-3.2 (bullseye) ▶ Debian ntp/ntp < 1:4.2.6.p5+dfsg-3.2 ▶ Ubuntu ntp/ntp < 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1
🔴 Vulnerability Details4 GHSA GHSA-67hp-c7g3-34pp: Multiple stack-based buffer overflows in ntpd in NTP before 4 ↗ 2022-05-13 ▶ Project0 Finding and exploiting ntpd vulnerabilities - Project Zero ↗ 2015-01-01 ▶ OSV ntp vulnerabilities ↗ 2014-12-22 ▶ OSV CVE-2014-9295: Multiple stack-based buffer overflows in ntpd in NTP before 4 ↗ 2014-12-20 ▶
📋 Vendor Advisories14 CISA ICS Network Time Protocol Vulnerabilities (Supplement Update A) ↗ 2015-02-05 ▶ CISA ICS Network Time Protocol Vulnerabilities (Update C) ↗ 2015-02-04 ▶ CISA ICS Network Time Protocol Vulnerabilities (Update B) ↗ 2014-12-23 ▶ Cisco Multiple Vulnerabilities in ntpd Affecting Cisco Products ↗ 2014-12-23 ▶ BSD FreeBSD-SA-14:31.ntp: Multiple vulnerabilities in NTP suite ↗ 2014-12-23 ▶ Show 9 more
📄 Research Papers3 arXiv Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection ↗ 2024-04-03 ▶ arXiv SAFE: Self-Attentive Function Embeddings for Binary Similarity ↗ 2019-12-19 ▶ arXiv Software-Defined Adversarial Trajectory Sampling ↗ 2017-04-30 ▶
💬 Community3 Bugzilla CVE-2014-9295 ntp: Multiple buffer overflows via specially-crafted packets ↗ 2014-12-19 ▶ Bugzilla CVE-2014-9296 CVE-2014-9294 CVE-2014-9295 CVE-2014-9293 ntp: various flaws [fedora-all] ↗ 2014-12-19 ▶ Bugzilla CVE-2014-9293 ntp: automatic generation of weak default key in config_auth() ↗ 2014-12-19 ▶