Comment Put restrict ... noquery in your ntp.conf file (Score 4, Informative) 115
http: //support.ntp.org/bin/view/Main/SecurityNotice
Buffer overflow in ctl_putdata()
References: Sec 2668 / CVE - 2014 - 9295 / VU #852879
Versions: All NTP4 releases before 4.2.8
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the ntpd process.
Mitigation - any of:
Upgrade to 4.2.8, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page.
Put restrict ... noquery in your ntp.conf file, for non-trusted senders.
Credit: This vulnerability was discovered by Stephen Roettger of the Google Security Team. w