Computer Security
[EN] securityvulns.ru no-pyccku


ntp client buffer overflow
Published:14.04.2009
Source:
SecurityVulns ID:9833
Type:client
Threat Level:
5/10
Description:Buffer overflow on NTP server reply parsing.
Affected:NTP : ntp 4.2
CVE:CVE-2009-0159 (Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.)
Original documentdocumentMANDRIVA, [ MDVSA-2009:092 ] ntp (14.04.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod