Submission + - Buffer overflows found in NTP reference implementation (ntp.org)
An anonymous reader writes: Google researchers Neel Mehta and Stephen Roettger have discovered 3 buffer overflow vulnerabilities in the server part of the NTP reference implementation, enabling attackers to use carefully crafted packets to execute arbitrary code with privileges of the ntpd process. Users should update their installations to version 4.2.8.