-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:309 http://www.mandriva.com/security/ _______________________________________________________________________ Package : ntp Date : December 3, 2009 Affected: 2008.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in ntp: Requesting peer information from a malicious remote time server may lead to an unexpected application termination or arbitrary code execution (CVE-2009-0159). A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd (CVE-2009-1252). Packages for 2008.0 are being provided due to extended support for Corporate products. The updated packages have been patched to prevent this. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: ce17e1c2cf64b1181b1172f3933fe705 2008.0/i586/ntp-4.2.4-10.2mdv2008.0.i586.rpm 66baede7d5a42d16d19639148f5e4d52 2008.0/i586/ntp-client-4.2.4-10.2mdv2008.0.i586.rpm f708723a1ab549c987ad64fa2862eb80 2008.0/i586/ntp-doc-4.2.4-10.2mdv2008.0.i586.rpm fb352aa8910f1bc1319df986769d15ab 2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm Mandriva Linux 2008.0/X86_64: b8519fa3b101a246d35d173745267d6c 2008.0/x86_64/ntp-4.2.4-10.2mdv2008.0.x86_64.rpm dd862d4411bfee35041267817e1e2f0e 2008.0/x86_64/ntp-client-4.2.4-10.2mdv2008.0.x86_64.rpm c38355a0069bc68c50e48726bd5d04e7 2008.0/x86_64/ntp-doc-4.2.4-10.2mdv2008.0.x86_64.rpm fb352aa8910f1bc1319df986769d15ab 2008.0/SRPMS/ntp-4.2.4-10.2mdv2008.0.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFLF+rdmqjQ0CJFipgRAodXAKC5aT0ePLmbNSalOgR03MecOfci4ACaA4JY Uc/m/wcRzfz3Nbleml90qVQ= =ClV1 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/