Apple Information for VU#852879

NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated)

Status

Affected

Vendor Statement

From the Apple support advisory:

    "OS X NTP Security Update - ntpd

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10.1

    Impact: A remote attacker may be able to execute arbitrary code

    Description: Several issues existed in ntpd that would have allowed an attacker to trigger buffer overflows. These issues were addressed through improved error checking.

    To verify the ntpd version, type the following command in Terminal: what /usr/sbin/ntpd. This update includes the following versions:

  • Mountain Lion: ntp-77.1.1
  • Mavericks: ntp-88.1.1
  • Yosemite: ntp-92.5.1

    CVE-ID

    CVE-2014-9295 : Stephen Roettger of the Google Security Team"

    Vendor Information

    We are not aware of further vendor information regarding this vulnerability.

    Vendor References

    https://support.apple.com/en-us/HT6601

    Addendum

    There are no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.