Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1038123 | Third Party Advisory VDB Entry |
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu | Vendor Advisory |
http://support.ntp.org/bin/view/Main/NtpBug3377 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/97052 | Third Party Advisory VDB Entry |
https://support.apple.com/HT208144 | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us | |
https://security.paloaltonetworks.com/CVE-2017-6460 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-03-27 10:59
Updated : 2017-10-23 18:29
NVD link : CVE-2017-6460
Mitre link : CVE-2017-6460
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
ntp
- ntp