Oval Definition:oval:com.redhat.rhsa:def:20091040
Revision Date:2009-05-18Version:635
Title:RHSA-2009:1040: ntp security update (Critical)
Description:The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.

  • A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd or, potentially, execute arbitrary code with the privileges of the "ntp" user. (CVE-2009-1252)

    Note: NTP authentication is not enabled by default.

  • A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially-crafted reply to an ntpq request that could crash ntpq or, potentially, execute arbitrary code with the privileges of the user running the ntpq command. (CVE-2009-0159)

    All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will be restarted automatically.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2009-0159
    CVE-2009-1252
    RHSA-2009:1040
    RHSA-2009:1040-02
    RHSA-2009:1040-02
    Platform(s):Red Hat Enterprise Linux 4
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 4 is installed
  • AND ntp is earlier than 0:4.2.0.a.20040617-8.el4_7.2
  • AND ntp is signed with Red Hat redhatrelease2 key
  • BACK