[20044] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ntpd =< 4.0.99k remote buffer overflow

daemon@ATHENA.MIT.EDU (Charles Sprickman)
Thu Apr 5 23:42:38 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.BSF.4.30.0104052001020.21512-100000@shell.inch.com>
Date:         Thu, 5 Apr 2001 20:03:38 -0400
Reply-To: Charles Sprickman <spork@INCH.COM>
From: Charles Sprickman <spork@INCH.COM>
X-To:         Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20010404222701.X91913@riget.scene.pl>

On Wed, 4 Apr 2001, Przemyslaw Frasunek wrote:

> /* ntpd remote root exploit / babcia padlina ltd. <venglin@freebsd.lublin.pl> */

Just a quick note to save others a bit of legwork...  If you are running
ntpd on a machine simply as a client, the following line in /etc/ntp.conf
should keep people away:

restrict default ignore

Before adding this (I actually had the wrong syntax), the exploit crashed
ntpd.  Afterwords, not a blip, and ntpdate shows that ntpd is not
answering anything...

Charles

home help back first fref pref prev next nref lref last post