CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
99.6%
Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow
remote attackers to execute arbitrary code via a crafted packet, related to
(1) the crypto_recv function when the Autokey Authentication feature is
used, (2) the ctl_putdata function, and (3) the configure function.
Author | Note |
---|---|
mdeslaur | configure() isn’t in lucid |
cwe.mitre.org/data/definitions/121.html
support.ntp.org/bin/view/Main/SecurityNotice#Buffer_overflow_in_crypto_recv
www.kb.cert.org/vuls/id/852879
launchpad.net/bugs/cve/CVE-2014-9295
nvd.nist.gov/vuln/detail/CVE-2014-9295
security-tracker.debian.org/tracker/CVE-2014-9295
ubuntu.com/security/notices/USN-2449-1
www.cve.org/CVERecord?id=CVE-2014-9295