CVE-2009-1252

Scores

EPSS

0.702medium70.2%
0%20%40%60%80%100%

Percentile: 70.2%

CVSS

6.8medium2.0
0246810

CVSS Score: 6.8/10

All CVSS Scores

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-119CWE-121

Recommendations

Source: nvd

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to usethe Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/docs/DOC-11259

URL: http://rhn.redhat.com/errata/RHSA-2009-1040.html

Source: nvd

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to usethe Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/docs/DOC-11259

URL: http://rhn.redhat.com/errata/RHSA-2009-1039.html

Vulnerable Software (6)

Type: Configuration

Product: ntp

Operating System: rhel 4

Trait:
{  "fixed": "4.2.0.a.20040617-8.el4_7.2"}

Source: redhat

Type: Configuration

Product: ntp

Operating System: rhel 4.7

Trait:
{  "fixed": "4.2.0.a.20040617-8.el4_7.2"}

Source: redhat

Type: Configuration

Product: ntp

Operating System: rhel 5

Trait:
{  "fixed": "4.2.2p1-9.el5_3.2"}

Source: redhat

Type: Configuration

Product: ntp

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "1:4.2.4p4+dfsg-3ubuntu2.2"}

Source: ubuntu

Type: Configuration

Product: ntp

Operating System: debian

Trait:
{  "fixed": "1:4.2.4p6+dfsg-2"}

Source: debian

Type: Configuration

Vendor: *

Product: ntp

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:ntp:ntp:4.2.4p0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:ntp:ntp:4.2.4p1:*:*:*:*:*:*:*",      "vulnerab...

Source: nvd

End of list