[ntp:security] [Bug 3076] [ntpd] send the overflow packet cause ntpd crash

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Fri Jul 22 06:46:14 UTC 2016


https://bugs.ntp.org/show_bug.cgi?id=3076

Juergen Perlinger <perlinger at ntp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |perlinger at ntp.org

--- Comment #2 from Juergen Perlinger <perlinger at ntp.org> 2016-07-22 06:46:14 UTC ---
(In reply to comment #1)
Somehow I'm not able to reproduce the attack... It would be best if someone
could create a binary (or base64 encoded) file that contains the raw UDP (!!)
data to be sent via 'nc' (netcat) as it's done for bugs 3075,3082,3083.

Trying to extract the UDP level data with wireshark from the packet capture did
not have the desired effect -- that is, nothing happened when I threw them to
ntpd with nc. Probably my fault, but for validation of the bug something easier
to reproduce would be highly appreciated!

-- 
Configure bugmail: https://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list