OpenBSD Information for VU#970472

Network Time Protocol ([x]ntpd) daemon contains buffer overflow in ntp_control:ctl_getitem() function

Status

Affected

Vendor Statement

No statement from the vendor is available at this time.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The OpenBSD ports collection does contain a vulnerable version of xntp.

The following extract was taken from the GNATs bug report about this issue:

http://cvs.openbsd.org/cgi-bin/wwwgnats.pl/full?pr=1758

 Here is an addition to the OpenBSD xntpd port that applies
 NAKAMURA Kazushi's patch.
 
 How to apply:
 
 # Add the new file: /usr/ports/sysutils/xntpd/patches/patch-ntp_control.c
 cd /usr/ports/sysutils/xntpd
 make uninstall && make clean && make && make install
 reboot # necessary because tickadj is run before system securelevel is changed
 
 Caveats:
 
 The new file /usr/ports/sysutils/xntpd/patches/patch-ntp_control.c is
 NAKAMURA Kazushi's patch -- nothing more.  It comes directly from the
 FreeBSD tree.  It may not be OpenBSD's preferred way of doing things,
 but it will close the hole until OpenBSD has it fixed.

If you have feedback, comments, or additional information about this vulnerability, please send us email.