CVE-2009-1252
19.05.2009, 19:30
Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.Enginsight
Vendor | Product | Version |
---|---|---|
ntp | ntp | 4.2.4p0:p0 |
ntp | ntp | 4.2.4p1:p1 |
ntp | ntp | 4.2.4p2:p2 |
ntp | ntp | 4.2.4p3:p3 |
ntp | ntp | 4.2.4p4:p4 |
ntp | ntp | 4.2.4p5:p5 |
ntp | ntp | 4.2.4p6:p6 |
ntp | ntp | 4.2.5p0:p0 |
ntp | ntp | 4.2.5p1:p1 |
ntp | ntp | 4.2.5p2:p2 |
ntp | ntp | 4.2.5p3:p3 |
ntp | ntp | 4.2.5p4:p4 |
ntp | ntp | 4.2.5p5:p5 |
ntp | ntp | 4.2.5p6:p6 |
ntp | ntp | 4.2.5p7:p7 |
ntp | ntp | 4.2.5p8:p8 |
ntp | ntp | 4.2.5p9:p9 |
ntp | ntp | 4.2.5p10:p10 |
ntp | ntp | 4.2.5p11:p11 |
ntp | ntp | 4.2.5p12:p12 |
ntp | ntp | 4.2.5p13:p13 |
ntp | ntp | 4.2.5p14:p14 |
ntp | ntp | 4.2.5p15:p15 |
ntp | ntp | 4.2.5p16:p16 |
ntp | ntp | 4.2.5p17:p17 |
ntp | ntp | 4.2.5p18:p18 |
ntp | ntp | 4.2.5p19:p19 |
ntp | ntp | 4.2.5p20:p20 |
ntp | ntp | 4.2.5p21:p21 |
ntp | ntp | 4.2.5p23:p23 |
ntp | ntp | 4.2.5p24:p24 |
ntp | ntp | 4.2.5p25:p25 |
ntp | ntp | 4.2.5p26:p26 |
ntp | ntp | 4.2.5p27:p27 |
ntp | ntp | 4.2.5p28:p28 |
ntp | ntp | 4.2.5p29:p29 |
ntp | ntp | 4.2.5p30:p30 |
ntp | ntp | 4.2.5p31:p31 |
ntp | ntp | 4.2.5p32:p32 |
ntp | ntp | 4.2.5p33:p33 |
ntp | ntp | 4.2.5p35:p35 |
ntp | ntp | 4.2.5p36:p36 |
ntp | ntp | 4.2.5p37:p37 |
ntp | ntp | 4.2.5p38:p38 |
ntp | ntp | 4.2.5p39:p39 |
ntp | ntp | 4.2.5p40:p40 |
ntp | ntp | 4.2.5p41:p41 |
ntp | ntp | 4.2.5p42:p42 |
ntp | ntp | 4.2.5p43:p43 |
ntp | ntp | 4.2.5p44:p44 |
ntp | ntp | 4.2.5p45:p45 |
ntp | ntp | 4.2.5p46:p46 |
ntp | ntp | 4.2.5p47:p47 |
ntp | ntp | 4.2.5p48:p48 |
ntp | ntp | 4.2.5p49:p49 |
ntp | ntp | 4.2.5p50:p50 |
ntp | ntp | 4.2.5p51:p51 |
ntp | ntp | 4.2.5p52:p52 |
ntp | ntp | 4.2.5p53:p53 |
ntp | ntp | 4.2.5p54:p54 |
ntp | ntp | 4.2.5p55:p55 |
ntp | ntp | 4.2.5p56:p56 |
ntp | ntp | 4.2.5p57:p57 |
ntp | ntp | 4.2.5p58:p58 |
ntp | ntp | 4.2.5p59:p59 |
ntp | ntp | 4.2.5p60:p60 |
ntp | ntp | 4.2.5p61:p61 |
ntp | ntp | 4.2.5p62:p62 |
ntp | ntp | 4.2.5p63:p63 |
ntp | ntp | 4.2.5p64:p64 |
ntp | ntp | 4.2.5p65:p65 |
ntp | ntp | 4.2.5p66:p66 |
ntp | ntp | 4.2.5p67:p67 |
ntp | ntp | 4.2.5p68:p68 |
ntp | ntp | 4.2.5p69:p69 |
ntp | ntp | 4.2.5p70:p70 |
ntp | ntp | 4.2.5p71:p71 |
ntp | ntp | 4.2.5p73:p73 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References