OpenBSD Information for VU#970472
Network Time Protocol ([x]ntpd) daemon contains buffer overflow in ntp_control:ctl_getitem() function
No statement from the vendor is available at this time.
The vendor has not provided us with any further information regarding this vulnerability.
The OpenBSD ports collection does contain a vulnerable version of xntp.
The following extract was taken from the GNATs bug report about this issue:
Here is an addition to the OpenBSD xntpd port that applies
NAKAMURA Kazushi's patch.
How to apply:
# Add the new file: /usr/ports/sysutils/xntpd/patches/patch-ntp_control.c
make uninstall && make clean && make && make install
reboot # necessary because tickadj is run before system securelevel is changed
The new file /usr/ports/sysutils/xntpd/patches/patch-ntp_control.c is
NAKAMURA Kazushi's patch -- nothing more. It comes directly from the
FreeBSD tree. It may not be OpenBSD's preferred way of doing things,
but it will close the hole until OpenBSD has it fixed.
If you have feedback, comments, or additional information about this vulnerability, please send us email.