[20105] in bugtraq
ntp-4.99k23.tar.gz is available
daemon@ATHENA.MIT.EDU (William D. Colburn (aka Schlake))
Mon Apr 9 14:17:38 2001
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-ID: <20010409093145.A31146@nmt.edu>
Date: Mon, 9 Apr 2001 09:31:45 -0600
Reply-To: "William D. Colburn (aka Schlake)" <wcolburn@NMT.EDU>
From: "William D. Colburn (aka Schlake)" <wcolburn@NMT.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
I haven't seen an announcement anywhere, but I noticed it on the FTP
server this morning. It is dated Friday evening.
ftp://ftp.udel.edu/pub/ntp/ntp4/ntp-4.0.99k23.tar.gz
I tried it out with the exploit posted by "babcia padlina
ltd. <venglin@freebsd.lublin.pl>" and it seems to be safe. I never had
a machine that the exploit worked against, but my ntp servers would exit
with a segfault when it was run against them. The new server does not
exit.
I am sending a copy of this message to Dr. Mills, in the hopes that he can
confim for us that k23 is a final, fixed, version for this exploit.
Also, someone on the ntp newsgroup this weekend said that the FreeBSD
patch prevented the overflow, but still corrupted data because of an off
by one error.
--
William Colburn, "Sysprog" <wcolburn@nmt.edu>
Computer Center, New Mexico Institute of Mining and Technology
http://www.nmt.edu/tcc/ http://www.nmt.edu/~wcolburn