The Network Time Protocol (NTP) is vulnerable to Denial Of Service (DoS). Robin Park and Dmitri Vinokurov discovered a flaw in the way ntpd handled certain malformed NTP packets. ntpd logged information about all such packets and replied with an NTP packet that was treated as malformed when received by another ntpd. A remote attacker could use this flaw to create an NTP packet reply loop between two ntpd servers via a malformed packet with a spoofed source IP address and port, causing ntpd on those servers to use excessive amounts of CPU time and fill disk space with log messages.
aix.software.ibm.com/aix/efixes/security/xntpd_advisory.asc
bugs.debian.org/cgi-bin/bugreport.cgi?bug=560074
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2010-005.txt.asc
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2010-005.txt.asc
kb.juniper.net/InfoCenter/index?page=content&id=JSA10673
kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
lists.vmware.com/pipermail/security-announce/2010/000082.html
marc.info/?l=bugtraq&m=130168580504508&w=2
marc.info/?l=bugtraq&m=136482797910018&w=2
secunia.com/advisories/37629
secunia.com/advisories/37922
secunia.com/advisories/38764
secunia.com/advisories/38794
secunia.com/advisories/38832
secunia.com/advisories/38834
secunia.com/advisories/39593
security-tracker.debian.org/tracker/CVE-2009-3563
securitytracker.com/id?1023298
sunsolve.sun.com/search/document.do?assetkey=1-77-1021781.1-1
support.avaya.com/css/P8/documents/100071808
support.ntp.org/bin/view/Main/SecurityNotice#DoS_attack_from_certain_NTP_mode
www-01.ibm.com/support/docview.wss?uid=isg1IZ68659
www-01.ibm.com/support/docview.wss?uid=isg1IZ71047
www.debian.org/security/2009/dsa-1948
www.kb.cert.org/vuls/id/568372
www.kb.cert.org/vuls/id/MAPG-7X7V6J
www.kb.cert.org/vuls/id/MAPG-7X7VD7
www.redhat.com/security/updates/classification/#moderate
www.securityfocus.com/bid/37255
www.vupen.com/english/advisories/2010/0510
www.vupen.com/english/advisories/2010/0528
www.vupen.com/english/advisories/2010/0993
access.redhat.com/errata/RHSA-2009:1648
bugzilla.redhat.com/show_bug.cgi?id=531213
lists.ntp.org/pipermail/announce/2009-December/000086.html
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11225
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12141
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19376
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7076
rhn.redhat.com/errata/RHSA-2009-1648.html
rhn.redhat.com/errata/RHSA-2009-1651.html
rhn.redhat.com/errata/RHSA-2010-0095.html
support.ntp.org/bugs/show_bug.cgi?id=1331
www.redhat.com/archives/fedora-package-announce/2009-December/msg00763.html
www.redhat.com/archives/fedora-package-announce/2009-December/msg00809.html