CVE Reference: CVE-2009-0159

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2009-0159

Description:
Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/49838

UBUNTU
  http://www.ubuntulinux.org/support/documentation/usn/usn-777-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html

ST
  1022033

SLACKWARE
  http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238

SAID
  Secunia Advisory: SA34608
  Secunia Advisory: SA35074
  Secunia Advisory: SA35137
  Secunia Advisory: SA35166
  Secunia Advisory: SA35169
  Secunia Advisory: SA35253
  Secunia Advisory: SA35138
  Secunia Advisory: SA35308
  Secunia Advisory: SA35336
  Secunia Advisory: SA35416
  Secunia Advisory: SA35630
  Secunia Advisory: SA37471

REDHAT
  http://rhn.redhat.com/errata/RHSA-2009-1040.html
  http://rhn.redhat.com/errata/RHSA-2009-1039.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:19392
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9634
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8665
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8386
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5411

OSVDB
  53593

NETBSD

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2009:092

HP
  http://marc.info/?l=bugtraq&m=136482797910018&w=2

GENTOO
  http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml

FEDORA

DEBIAN
  http://www.debian.org/security/2009/dsa-1801

CONFIRM
  http://www.vmware.com/security/advisories/VMSA-2009-0016.html
  http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565
  http://support.apple.com/kb/HT3549
  http://bugs.pardus.org.tr/show_bug.cgi?id=9532

CERT
  http://www.us-cert.gov/cas/techalerts/TA09-133A.html

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded

BID
  34481

APPLE
  http://lists.apple.com/archives/security-announce/2009/May/msg00002.html


Return to the previous page.