[20053] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ntpd =< 4.0.99k remote buffer overflow

daemon@ATHENA.MIT.EDU (Bruce A. Mah)
Fri Apr 6 04:42:13 2001

Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_1092060328P";
              micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Message-ID:  <200104050310.f353AnX19227@bmah-freebsd-0.cisco.com>
Date:         Wed, 4 Apr 2001 20:10:49 -0700
Reply-To: bmah@cisco.com
From: "Bruce A. Mah" <bmah@cisco.com>
X-To:         Crist Clark <crist.clark@GLOBALSTAR.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <3ACBCF0D.847AECA4@globalstar.com>

--==_Exmh_1092060328P
Content-Type: text/plain; charset=us-ascii

If memory serves me right, Crist Clark wrote:
> Przemyslaw Frasunek wrote:
> >
> > /* ntpd remote root exploit / babcia padlina ltd. <venglin@freebsd.lublin.p
> l> */
>
> Not good. Not good. Verified the exploit worked on FreeBSD 4.2-STABLE with
> the stock 4.0.99b. FreeBSD has a fix in CURRENT already.

FreeBSD 4-STABLE got the fix a couple minutes later.

Bruce.




--==_Exmh_1092060328P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: Exmh version 2.2 06/23/2000

iD8DBQE6y+I52MoxcVugUsMRAgrkAKCULaMwBRg1NETvgu+ERsJ74kOAqACeODFZ
ZLOEFaVV40VWLlG9mLfbhII=
=5Ayh
-----END PGP SIGNATURE-----

--==_Exmh_1092060328P--

home help back first fref pref prev next nref lref last post