[Git][NTPsec/ntpsec][master] NEWS update - CVEs from cure53 pentest.
Eric S. Raymond
gitlab at mg.gitlab.com
Tue Mar 21 19:59:04 UTC 2017
Eric S. Raymond pushed to branch master at NTPsec / ntpsec
Commits:
4632adac by Eric S. Raymond at 2017-03-21T15:58:53-04:00
NEWS update - CVEs from cure53 pentest.
- - - - -
1 changed file:
- NEWS
Changes:
=====================================
NEWS
=====================================
--- a/NEWS
+++ b/NEWS
@@ -31,6 +31,26 @@ installed by default.
The SHM refclock no longer limits the value of SHM time by default.
This allows SHM to work on systems with no RTC by default.
+The following CVEs revealed by a Mozilla penetration test and reported in
+CERT VU#325339 have been resolved:
+
+CVE-2017-6464: Denial of Service via Malformed Config
+CVE-2017-6463: Authenticated DoS via Malicious Config Option
+CVE-2017-6458: Potential Overflows in ctl_put() functions
+CVE-2017-6451: Improper use of snprintf() in mx4200_send()
+
+The following CVEs, announced simultaneously, affected NTP Classic but
+not NTPsec, because we had already removed the attack surface:
+
+CVE-2017-6462: Buffer Overflow in DPTS Clock
+CVE-2017-6455: Privileged execution of User Library code
+CVE-2017-6452: Stack Buffer Overflow from Command Line
+CVE-2017-6459: Data Structure terminated insufficiently
+CVE-2017-6460: Buffer Overflow in ntpq when fetching reslist
+
+We gratefully acknowledge the work of of Dr.-Ing. Mario Hederich
+at cure53 in detecting these problems and his cooperation in resolving them.
+
== 2016-12-30: 0.9.6 ==
ntpkeygen has been moved from C to Python. This is not a functional
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/4632adac6ad07c4ce5819b194848ac1b4df4c747
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20170321/df61e180/attachment.html>
More information about the vc
mailing list