[ntp:security] [Bug 3110] Windows: ntpd DoS by oversized UDP packet

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Fri Sep 9 16:51:28 UTC 2016


--- Comment #5 from Juergen Perlinger <perlinger at ntp.org> 2016-09-09 16:51:28 UTC ---
Created attachment 1443
  --> http://bugs.ntp.org/attachment.cgi?id=1443
POC (proof of concept) python script

The POC script can be used for testing that the daemon now survives over-sized
UDP packets, while previous Windows versions stop working on the network level.

Please fix the IP address of the SUT!

The whole thing is trivial enough to be emulated with a shell script and
netcat, but I didn't expect it to become so simple.

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list