#VU54023 Buffer overflow in ntp - CVE-2015-7853
Published: June 10, 2021
ntp
ntp.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "datalen" parameter in the "refclock" driver. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://bugzilla.redhat.com/show_bug.cgi?id=1274262
- http://www.securityfocus.com/bid/77273
- http://support.ntp.org/bin/view/Main/NtpBug2920
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf