CERT mailing list archives

Vulnerabilities Identified in Network Time Protocol Daemon (ntpd)


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Mon, 21 Nov 2016 14:30:40 -0600

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

 

Vulnerabilities Identified in Network Time Protocol Daemon (ntpd) [ 
https://www.us-cert.gov/ncas/current-activity/2016/11/21/Vulnerabilities-Identified-Network-Time-Protocol-Daemon-ntpd ] 
11/21/2016 01:50 PM EST 
Original release date: November 21, 2016

The Network Time Foundation's NTP Project has released version ntp-4.2.8p9 to address multiple vulnerabilities in ntpd. 
Exploitation of some of these vulnerabilities may allow a remote attacker to cause a denial-of-service condition.

US-CERT encourages users and administrators to review Vulnerability Note VU#633847 [ 
http://www.kb.cert.org/vuls/id/633847 ] and the NTP Security Notice Page [ http://nwtime.org/ntp428p9_release/ ] for 
vulnerability and mitigation details.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: