[nog] CVE-2014-9295 (remote exploit in ntpd)

Vasil Kolev vasil at ludost.net
Sat Dec 20 02:07:55 EET 2014


If you run ntpd anywhere:

https://threatpost.com/exploits-circulating-for-remote-code-execution-flaws-in-ntp-protocol/110001
http://support.ntp.org/bin/view/Main/SecurityNotice#Buffer_overflow_in_ctl_putdata

(it's bad.)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 181 bytes
Desc: OpenPGP digital signature
URL: <http://lists.ludost.net/pipermail/nog/attachments/20141220/cfec8705/attachment.sig>


More information about the Nog mailing list