==========================================================Ubuntu Security Notice USN-777-1               May 19, 2009
ntp vulnerabilities
CVE-2009-0159, CVE-2009-1252
==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 8.10
Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  ntp                             1:4.2.0a+stable-8.1ubuntu6.2
  ntp-server                      1:4.2.0a+stable-8.1ubuntu6.2

Ubuntu 8.04 LTS:
  ntp                             1:4.2.4p4+dfsg-3ubuntu2.2

Ubuntu 8.10:
  ntp                             1:4.2.4p4+dfsg-6ubuntu2.3

Ubuntu 9.04:
  ntp                             1:4.2.4p4+dfsg-7ubuntu5.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

A stack-based buffer overflow was discovered in ntpq. If a user were
tricked into connecting to a malicious ntp server, a remote attacker could
cause a denial of service in ntpq, or possibly execute arbitrary code with
the privileges of the user invoking the program. (CVE-2009-0159)

Chris Ries discovered a stack-based overflow in ntp. If ntp was configured
to use autokey, a remote attacker could send a crafted packet to cause a
denial of service, or possible execute arbitrary code. (CVE-2009-1252)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

          Size/MD5:   262624 3c306d4e68810bfa91f72a5b92cd0308
          Size/MD5:      872 10eff071be4ba03f992b7d2d240c1f0c
          Size/MD5:  2272395 30f8b3d5b970c14dce5c6d8c922afa3e

  Architecture independent packages:

          Size/MD5:   891104 94f3aec7998e4a9e1e48180d79fd659b

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:    34892 b92a4deecbc84b6d842bf7856727d921
          Size/MD5:   136264 62e7a8b3240502f3e404225a6c24a976
          Size/MD5:   270440 0b264494db3ba53cf233ff112a40796b
          Size/MD5:    47810 edce44b9fc109133209069b17301f476
          Size/MD5:   224034 9aa4a9a74c72607acc3c858b7c6d4366

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:    33806 25b469db17cbb30269d5ae5d763ab0f2
          Size/MD5:   121560 7360b2078ee05de0d67f779dae5d67c8
          Size/MD5:   256644 a2164630c3011129f4b22d0b82c4259c
          Size/MD5:    44472 681b58a3dd5cbdc0f845f6c0ac670d7a
          Size/MD5:   198342 4156eb43918077c9afe35748c5678b44

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:    37052 844fcdf80da06e0805b749ef4bc3df9f
          Size/MD5:   135060 91c6db51fb366fc544a3a601d9f22f65
          Size/MD5:   271370 aff69d174dd8c57d24c38e82b2191af2
          Size/MD5:    49126 11d131cbcdbf88785904923df5e247e6
          Size/MD5:   222152 92b60a7767280429184b84b96b1ce5fe

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:    34310 c45a59691738e4b62bcbd3bbcf7f7c9c
          Size/MD5:   126660 9ad4394cc7381174485993ba41001dff
          Size/MD5:   261548 8d1375b6941de24ee31db196c7e3569c
          Size/MD5:    46674 e987304d551d69052763b1aa377244a1
          Size/MD5:   207388 ba43f80287f44ee657660deca2b2d0e5

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

          Size/MD5:   286728 3855e15b60b98d7c1c39ca58f69eb42f
          Size/MD5:     1046 f9c6b3c9adf0c5fbd7bd32af16cfda72
          Size/MD5:  2835029 dc2b3ac9cc04b0f29df35467514c9884

  Architecture independent packages:

          Size/MD5:   928002 d7ec157baefbc58639a9e405427a5a8c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   477248 d671d47c0401997a02a2c2f11e9f4d7e
          Size/MD5:    65082 2c68f30b996b18118b4b85f8d0bb2f3f

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   432480 13c4d104fe6e46088030628931bfa3cc
          Size/MD5:    61124 94c7efececf2038c93c8add72d8207ce

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:   435346 73421fbab6633303b700aeec6a6213e7
          Size/MD5:    61074 7bf665dfd5a9585fa08121239847623d

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   490358 51cc28d99069364d840bd037585e5b38
          Size/MD5:    66666 dd9c787890761ffac75fab20d2660d3e

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   442246 1b5ca2fd902af277675fe1963327679b
          Size/MD5:    61866 cfad1625994273cd8d1c701ec108266b

Updated packages for Ubuntu 8.10:

  Source archives:

          Size/MD5:   305715 3f331886531036808a2c2b3a32d78a0f
          Size/MD5:     1555 a887f244ea74ecce910a8ebfb159573c
          Size/MD5:  2835029 dc2b3ac9cc04b0f29df35467514c9884

  Architecture independent packages:

          Size/MD5:   928660 72eb9329b637897a085bf23df35035ee

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   487118 7af13d44b196c632abf090357d904f7d
          Size/MD5:    66026 2295725e3b86ed6dbb05fcb6c99dc612

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   442228 dc12ebb96df581dbb97506171bb155c3
          Size/MD5:    62216 cea15129abf766907060a4e164a69730

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:   441604 dd4be304cbe8c4c422bbab3ec68499fa
          Size/MD5:    61986 442b34ba10fcbc95ab2a3ce08d2743b1

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   491218 c1b38cfd8dcead19bab8dd71988f4b83
          Size/MD5:    67036 1f64d1eefd532fa24856fd54ec7f2798

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   449306 a423c4417af2e5fe76e7a9a7fe61378b
          Size/MD5:    62736 cd33d3395ac312dde92557df1a357e7e

Updated packages for Ubuntu 9.04:

  Source archives:

          Size/MD5:   306018 1f7251838d9aeb8e9d8c6e32e7f25cac
          Size/MD5:     1556 4c2bd40a447f612050281a771cbd727d
          Size/MD5:  2835029 dc2b3ac9cc04b0f29df35467514c9884

  Architecture independent packages:

          Size/MD5:   928978 f5c3fee6798769926a54edd1ca723ae6

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

          Size/MD5:   487468 2eab3d5589fa5cb6158ad3e9868e75cc
          Size/MD5:    66338 b714b28096a7d4d3c097785c570b0daa

  i386 architecture (x86 compatible Intel/AMD):

          Size/MD5:   442532 4be64f24b65762d9fd7e0da2c6f13402
          Size/MD5:    62582 b264e7cd0451c906b33e1c290d8486d5

  lpia architecture (Low Power Intel Architecture):

          Size/MD5:   441976 5d0b2cea98ac625c4caeaceea178a896
          Size/MD5:    62330 055cf1659c234b249812092926162a69

  powerpc architecture (Apple Macintosh G3/G4/G5):

          Size/MD5:   491418 e3b09166b30a91b4ad6641200b799cd5
          Size/MD5:    67428 f0643d6734f76630497bcd6de9d62a09

  sparc architecture (Sun SPARC/UltraSPARC):

          Size/MD5:   449352 56988b15e8fd2ab15060ee9c7755920e
          Size/MD5:    63058 1a10d80527f39e62fc59998c40a47162

Ubuntu 777-1: Ntp vulnerabilities

May 19, 2009
A stack-based buffer overflow was discovered in ntpq

Summary

Update Instructions

References

Severity
ntp vulnerabilities

Package Information

Related News