NTP BUG 2667: Buffer overflow in crypto_recv()
Last update: June 28, 2022 20:06 UTC (57417e17c)
When Autokey Authentication is enabled (i.e. the
ntp.conf file contains a
crypto pw ... directive) a remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege level of the
- Upgrade to 4.2.8 or later.
- Disable Autokey Authentication by removing, or commenting out, all configuration directives beginning with the
crypto keyword in your
restrict ... noquery in your
ntp.conf file, for non-trusted senders.
This vulnerability was discovered by Stephen Roettger of the Google Security Team.