NTP: Remote execution of arbitrary code Multiple errors in the NTP client and server programs might allow for the remote execution of arbitrary code. ntp May 26, 2009 May 26, 2009: 01 263033 268962 remote 4.2.4_p7 4.2.4_p7

NTP contains the client and daemon implementations for the Network Time Protocol.

Multiple vulnerabilities have been found in the programs included in the NTP package:

A remote attacker might send a specially crafted package to a machine running ntpd, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the daemon, or a Denial of Service. NOTE: Successful exploitation requires the "autokey" feature to be enabled. This feature is only available if NTP was built with the 'ssl' USE flag.

Furthermore, a remote attacker could entice a user into connecting to a malicious server using ntpq, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application, or a Denial of Service.

You can protect against CVE-2009-1252 by disabling the 'ssl' USE flag and recompiling NTP.

All NTP users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7"
CVE-2009-0159 CVE-2009-1252 a3li a3li