[ntp:security] [Bug 2921] New: TALOS-CAN-0065: Password Length Memory Corruption Vulnerability

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Thu Oct 1 11:28:32 UTC 2015


http://bugs.ntp.org/show_bug.cgi?id=2921

             Bug #: 2921
           Summary: TALOS-CAN-0065: Password Length Memory Corruption
                    Vulnerability
           Product: ntp
           Version: 4.2.8
          Platform: All
        OS/Version: All
            Status: CONFIRMED
          Severity: normal
          Priority: P3
         Component: Security Bugs
        AssignedTo: stenn at ntp.org
        ReportedBy: stenn at ntp.org
                CC: security at ntp.org
             Group: Security
    Classification: Unclassified


Harlan Stenn <stenn at ntp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
              Flags|                            |blocking4.2.8+

A potential buffer overflow vulnerability exists in the password management
functionality of ntp. A specially crafted key file could cause a buffer
overflow potentially resulting in memory being modified. An attacker could
provide a malicious password to trigger this vulnerability.

-- 
Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list