Date: Wed, 04 Apr 2001 18:14:37 -0600 From: Brett Glass <brett@lariat.org> To: Michael Bryan <fbsd-secure@ursine.com>, freebsd-security@FreeBSD.ORG Subject: Re: Fwd: ntpd =< 4.0.99k remote buffer overflow Message-ID: <4.3.2.7.2.20010404181106.044485d0@localhost> In-Reply-To: <3ACBB263.2804E9C2@ursine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Workaround: Use /usr/sbin/ntpdate -s time.nist.gov (or pick your favorite server) periodically from /etc/crontab. (Once a day, at an odd hour and minute of the morning, is sufficient for most machines.) This is what we have always done. It reduces overhead because there isn't a daemon constantly running. --Brett At 05:46 PM 4/4/2001, Michael Bryan wrote: >Heads up. This just came across BugTraq, will likely affect FreeBSD. >As of 4.2-RELEASE, the ntpd that ships with FreeBSD is 4.0.99b. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20010404181106.044485d0>