Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0159

Опубликовано: 14 апр. 2009
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 6.8

Описание

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

РелизСтатусПримечание
dapper

released

1:4.2.0a+stable-8.1ubuntu6.2
devel

released

4.2.4p6+dfsg-1ubuntu2
gutsy

ignored

end of life, was needed
hardy

released

1:4.2.4p4+dfsg-3ubuntu2.2
intrepid

released

1:4.2.4p4+dfsg-6ubuntu2.3
jaunty

released

1:4.2.4p4+dfsg-7ubuntu5.1
upstream

released

4.2.4p7-RC2

Показывать по

EPSS

Процентиль: 94%
0.13083
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

nvd
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

debian
около 16 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c ...

github
около 3 лет назад

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

oracle-oval
около 16 лет назад

ELSA-2009-1039: ntp security update (IMPORTANT)

EPSS

Процентиль: 94%
0.13083
Средний

6.8 Medium

CVSS2