Joined: 12 May 2004
|Posted: Sun Jan 03, 2010 12:26 am Post subject: [ GLSA 201001-01 ] NTP: Denial of Service
|Gentoo Linux Security Advisory
Title: NTP: Denial of Service (GLSA 201001-01)
Date: January 03, 2010
A Denial of Service condition in ntpd can cause excessive CPU or bandwidth
NTP is a set of the Network Time Protocol programs.
Vulnerable: < 4.2.4_p7-r1
Unaffected: >= 4.2.4_p7-r1
Architectures: All supported architectures
Robin Park and Dmitri Vinokurov discovered that ntp_request.c in ntpd
does not handle MODE_PRIVATE packets correctly, causing a continuous
exchange of MODE_PRIVATE error responses between two NTP daemons or
causing high CPU load on a single host.
A remote, unauthenticated attacker could send a specially crafted
MODE_PRIVATE packet, allowing for a Denial of Service condition (CPU
and bandwidth consumption).
There is no known workaround at this time.
All NTP users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7-r1"