From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1M8zEb-0002MJ-DO for garchives@archives.gentoo.org; Tue, 26 May 2009 16:10:37 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id C4DDEE035D; Tue, 26 May 2009 16:08:56 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 0D57BE02CD for ; Tue, 26 May 2009 16:06:35 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id B210666249 for ; Tue, 26 May 2009 16:06:33 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -2.533 X-Spam-Level: X-Spam-Status: No, score=-2.533 required=5.5 tests=[AWL=0.066, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mn9iOZUx+Q44 for ; Tue, 26 May 2009 16:06:27 +0000 (UTC) Received: from mail.netloc.info (mail.netloc.info [84.16.251.62]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id C371466283 for ; Tue, 26 May 2009 16:06:26 +0000 (UTC) Received: from [192.168.178.31] (p50819AB6.dip0.t-ipconnect.de [80.129.154.182]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client did not present a certificate) by mail.netloc.info (Postfix) with ESMTPSA id 44D529F735; Tue, 26 May 2009 18:06:20 +0200 (CEST) Subject: [gentoo-announce] [ GLSA 200905-08 ] NTP: Remote execution of arbitrary code From: Alex Legler To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-3xMTnFch7mf78xePpfOC" Date: Tue, 26 May 2009 18:06:20 +0200 Message-Id: <1243353980.4227.48.camel@localhost> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org Mime-Version: 1.0 X-Mailer: Evolution 2.26.2 X-Archives-Salt: 331475d2-4756-4349-8a82-90225c456e66 X-Archives-Hash: 9c83ad607ac4d7d66aae212a05f2f132 --=-3xMTnFch7mf78xePpfOC Content-Type: text/plain Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200905-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: NTP: Remote execution of arbitrary code Date: May 26, 2009 Bugs: #263033, #268962 ID: 200905-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple errors in the NTP client and server programs might allow for the remote execution of arbitrary code. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D NTP contains the client and daemon implementations for the Network Time Protocol. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/ntp < 4.2.4_p7 >=3D 4.2.4_p7 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been found in the programs included in the NTP package: * Apple Product Security reported a boundary error in the cookedprint() function in ntpq/ntpq.c, possibly leading to a stack-based buffer overflow (CVE-2009-0159). * Chris Ries of CMU reported a boundary error within the crypto_recv() function in ntpd/ntp_crypto.c, possibly leading to a stack-based buffer overflow (CVE-2009-1252). Impact =3D=3D=3D=3D=3D=3D A remote attacker might send a specially crafted package to a machine running ntpd, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the daemon, or a Denial of Service. NOTE: Successful exploitation requires the "autokey" feature to be enabled. This feature is only available if NTP was built with the 'ssl' USE flag. Furthermore, a remote attacker could entice a user into connecting to a malicious server using ntpq, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application, or a Denial of Service. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D You can protect against CVE-2009-1252 by disabling the 'ssl' USE flag and recompiling NTP. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All NTP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=3Dnet-misc/ntp-4.2.4_p7" References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2009-0159 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-0159 [ 2 ] CVE-2009-1252 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-1252 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200905-08.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --=-3xMTnFch7mf78xePpfOC Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) iEYEABECAAYFAkocE3wACgkQk+oqhfPAZGnpKgCghkgvDalcELhcFEV69MHPRZa0 Q10An0QC+ug2QYnZGeVCOc7CepY4MqJf =u+2r -----END PGP SIGNATURE----- --=-3xMTnFch7mf78xePpfOC--