Lucene search

K
f5F5F5:K15936
HistorySep 16, 2015 - 12:00 a.m.

K15936 : NTP vulnerability CVE-2014-9295

2015-09-1600:00:00
my.f5.com
32

AI Score

9.5

Confidence

High

EPSS

0.966

Percentile

99.6%

Security Advisory Description

Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
(
CVE-2014-9295
)
Impact
An attacker may be able to run arbitrary code using a crafted NTP packet.
There are multiple parts to this NTP vulnerability:
(1) The crypoto_rec function is not used in a default NTP configuration. The BIG-IP system is vulnerable only if Autokey Authentication is enabled through manual customizations to NTP configuration files.
(2) Thectl_putdatafunction impacts the BIG-IP system as a local-only vulnerability where the attacker must already be on the system using shell. The BIG-IP system is vulnerable with a default NTP configuration.
(3) The configure() function is not found to be used by the BIG-IP system and the components needed for the vulnerability are not enabled. The BIG-IP system is not vulnerable to this part of the vulnerability.