Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
- http://www.kb.cert.org/vuls/id/852879
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://kc.mcafee.com/corporate/index?page=content&id=SB10103
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/MacMiniVault/NTPUpdateSnowLeopard
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-
- https://github.com/opragel/osx-10.7-ntp
- https://github.com/sous-chefs/ntp