Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
References
Link | Resource |
---|---|
http://support.ntp.org/bin/view/Main/NtpBug3377 | Patch Vendor Advisory |
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu | Vendor Advisory |
http://www.securityfocus.com/bid/97052 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038123 | Third Party Advisory VDB Entry |
https://security.paloaltonetworks.com/CVE-2017-6460 | |
https://support.apple.com/HT208144 | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-03-27 17:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6460
Mitre link : CVE-2017-6460
CVE.ORG link : CVE-2017-6460
JSON object : View
Products Affected
ntp
- ntp
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer