Date: Wed, 04 Apr 2001 19:09:03 -0700 From: "Crist Clark" <crist.clark@globalstar.com> To: David La Croix <dlacroix@cowpie.acm.vt.edu> Cc: Michael Bryan <fbsd-secure@ursine.com>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: ntpd =< 4.0.99k remote buffer overflow Message-ID: <3ACBD3BF.52BF23E6@globalstar.com> References: <200104050156.f351uiq20419@cowpie.acm.vt.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
David La Croix wrote: > > > > > > > Heads up. This just came across BugTraq, will likely affect FreeBSD. > > As of 4.2-RELEASE, the ntpd that ships with FreeBSD is 4.0.99b. > > > > > > Haven't seen anybody mention this yet.... (and I hate to admit to > still using 3.x) I have a production box which I haven't upgraded yet... > > Is the version of xntpd in 3.x-STABLE (xntpdc version=3.4e) > succeptable to this, or any other, known buffer overflows? Test it. If you compile the code and shoot, it will crash the daemon even if the exploit is not successful. But that tells you the potential is there. I took that FreeBSD and Linux exploit and aimed it at Sparc box running xntpd 3.4y and *CRASH*. The xntpd cored and died. The buffer overrun looks like it goes back at least that far. It should not be too hard to track it to the source. But I am too busy trying to assess how to handle all the machines I _know_ are vulnerable to do that. The idea that something like the NTP built in to Cisco's IOS might be based off of vulnerable [x]ntpd code frankly scares the beejeezus out of me. -- Crist J. Clark Network Security Engineer crist.clark@globalstar.com Globalstar, L.P. (408) 933-4387 FAX: (408) 933-4926 The information contained in this e-mail message is confidential, intended only for the use of the individual or entity named above. If the reader of this e-mail is not the intended recipient, or the employee or agent responsible to deliver it to the intended recipient, you are hereby notified that any review, dissemination, distribution or copying of this communication is strictly prohibited. If you have received this e-mail in error, please contact postmaster@globalstar.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3ACBD3BF.52BF23E6>