// For flags

CVE-2009-0159

ntp: buffer overflow in ntpq

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.

Desbordamiento de búfer basado en pila en la función cookedprint en ntpq/ntpq.c en ntpq en NTP versiones anteriores a v4.2.4p7-RC2 permite a servidores NTP remotos ejecutar código de su elección a través de respuestas manipuladas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-01-16 CVE Reserved
  • 2009-04-14 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-121: Stack-based Buffer Overflow
CAPEC
References (47)
URL Date SRC
URL Date SRC
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc 2018-10-11
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html 2018-10-11
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html 2018-10-11
http://marc.info/?l=bugtraq&m=136482797910018&w=2 2018-10-11
http://rhn.redhat.com/errata/RHSA-2009-1039.html 2018-10-11
http://rhn.redhat.com/errata/RHSA-2009-1040.html 2018-10-11
http://secunia.com/advisories/34608 2018-10-11
http://secunia.com/advisories/35074 2018-10-11
http://secunia.com/advisories/35137 2018-10-11
http://secunia.com/advisories/35138 2018-10-11
http://secunia.com/advisories/35166 2018-10-11
http://secunia.com/advisories/35169 2018-10-11
http://secunia.com/advisories/35253 2018-10-11
http://secunia.com/advisories/35308 2018-10-11
http://secunia.com/advisories/35336 2018-10-11
http://secunia.com/advisories/35416 2018-10-11
http://secunia.com/advisories/35630 2018-10-11
http://secunia.com/advisories/37471 2018-10-11
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238 2018-10-11
http://www.debian.org/security/2009/dsa-1801 2018-10-11
http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml 2018-10-11
http://www.mandriva.com/security/advisories?name=MDVSA-2009:092 2018-10-11
http://www.vupen.com/english/advisories/2009/0999 2018-10-11
http://www.vupen.com/english/advisories/2009/1297 2018-10-11
http://www.vupen.com/english/advisories/2009/3316 2018-10-11
https://bugzilla.redhat.com/show_bug.cgi?id=490617 2009-12-08
https://rhn.redhat.com/errata/RHSA-2009-1651.html 2018-10-11
https://usn.ubuntu.com/777-1 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html 2018-10-11
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html 2018-10-11
https://access.redhat.com/security/cve/CVE-2009-0159 2009-12-08
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
<= 4.2.4p7
Search vendor "Ntp" for product "Ntp" and version " <= 4.2.4p7"
rc1
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.72
Search vendor "Ntp" for product "Ntp" and version "4.0.72"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.73
Search vendor "Ntp" for product "Ntp" and version "4.0.73"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.90
Search vendor "Ntp" for product "Ntp" and version "4.0.90"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.91
Search vendor "Ntp" for product "Ntp" and version "4.0.91"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.92
Search vendor "Ntp" for product "Ntp" and version "4.0.92"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.93
Search vendor "Ntp" for product "Ntp" and version "4.0.93"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.94
Search vendor "Ntp" for product "Ntp" and version "4.0.94"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.95
Search vendor "Ntp" for product "Ntp" and version "4.0.95"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.96
Search vendor "Ntp" for product "Ntp" and version "4.0.96"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.97
Search vendor "Ntp" for product "Ntp" and version "4.0.97"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.98
Search vendor "Ntp" for product "Ntp" and version "4.0.98"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.0.99
Search vendor "Ntp" for product "Ntp" and version "4.0.99"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.1.0
Search vendor "Ntp" for product "Ntp" and version "4.1.0"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.1.2
Search vendor "Ntp" for product "Ntp" and version "4.1.2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.0
Search vendor "Ntp" for product "Ntp" and version "4.2.0"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2
Search vendor "Ntp" for product "Ntp" and version "4.2.2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p1
Search vendor "Ntp" for product "Ntp" and version "4.2.2p1"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p2
Search vendor "Ntp" for product "Ntp" and version "4.2.2p2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p3
Search vendor "Ntp" for product "Ntp" and version "4.2.2p3"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.2p4
Search vendor "Ntp" for product "Ntp" and version "4.2.2p4"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4
Search vendor "Ntp" for product "Ntp" and version "4.2.4"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p0
Search vendor "Ntp" for product "Ntp" and version "4.2.4p0"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p1
Search vendor "Ntp" for product "Ntp" and version "4.2.4p1"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p2
Search vendor "Ntp" for product "Ntp" and version "4.2.4p2"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p3
Search vendor "Ntp" for product "Ntp" and version "4.2.4p3"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p4
Search vendor "Ntp" for product "Ntp" and version "4.2.4p4"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p5
Search vendor "Ntp" for product "Ntp" and version "4.2.4p5"
-
Affected
Ntp
Search vendor "Ntp"
Ntp
Search vendor "Ntp" for product "Ntp"
4.2.4p6
Search vendor "Ntp" for product "Ntp" and version "4.2.4p6"
-
Affected