Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Apr 2001 18:14:37 -0600
From:      Brett Glass <brett@lariat.org>
To:        Michael Bryan <fbsd-secure@ursine.com>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ntpd =< 4.0.99k remote buffer overflow
Message-ID:  <4.3.2.7.2.20010404181106.044485d0@localhost>
In-Reply-To: <3ACBB263.2804E9C2@ursine.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Workaround: Use

/usr/sbin/ntpdate -s time.nist.gov (or pick your favorite server)

periodically from /etc/crontab. (Once a day, at an odd hour and
minute of the morning, is sufficient for most machines.) This 
is what we have always done. It reduces overhead because there 
isn't a daemon constantly running.

--Brett

At 05:46 PM 4/4/2001, Michael Bryan wrote:
  

>Heads up.  This just came across BugTraq, will likely affect FreeBSD.
>As of 4.2-RELEASE, the ntpd that ships with FreeBSD is 4.0.99b.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20010404181106.044485d0>