ntp is vulnerable to denial of service. A stack-based buffer overflow occurs in ntpq
and ntpdc
resulting in a crash or possibly arbitary code execution, when an attacker passes a long string as the argument for an IPv4 or IPv5 command-line parameter.