Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0159

Опубликовано: 14 апр. 2009
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ntpfixed1:4.2.4p6+dfsg-2package

EPSS

Процентиль: 94%
0.13083
Средний

Связанные уязвимости

ubuntu
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

redhat
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

nvd
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

github
около 3 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

oracle-oval
около 16 лет назад

ELSA-2009-1039: ntp security update (IMPORTANT)

EPSS

Процентиль: 94%
0.13083
Средний