CVE-2014-9751

NameCVE-2014-9751
DescriptionThe read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine's network interface with a packet from the ::1 address.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-149-1, DSA-3154-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntp (PTS)buster1:4.2.8p12+dfsg-4fixed
bullseye1:4.2.8p15+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntpsourcesqueeze1:4.2.6.p2+dfsg-1+deb6u2DLA-149-1
ntpsourcewheezy1:4.2.6.p5+dfsg-2+deb7u2DSA-3154-1
ntpsource(unstable)1:4.2.6.p5+dfsg-4

Notes

http://bugs.ntp.org/show_bug.cgi?id=2672 (not yet public)

Search for package or bug name: Reporting problems