An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
Puede ocurrir un desbordamiento de entero en NTP-dev.4.3.70 que conduce a una operación de copia de memoria fuera de límites cuando se procesa un paquete de modo privado especialmente manipulado. El paquete manipulado necesita tener el código correcto de autenticación de mensajes y un timestamp valido. Cuando es procesado por el daemon NTP, conduce a un bloqueo inmediato.
Multiple Cisco products incorporate a version of the ntpd package. Versions of this package are affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition or modify the time being advertised by a device acting as a network time protocol (NTP) server. On October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker gaining the ability to modify an NTP server's advertised time.