Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
References
Link | Resource |
---|---|
http://support.ntp.org/bin/view/Main/NtpBug3377 | Patch Vendor Advisory |
http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu | Vendor Advisory |
http://www.securityfocus.com/bid/97052 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038123 | Third Party Advisory VDB Entry |
https://security.paloaltonetworks.com/CVE-2017-6460 | |
https://support.apple.com/HT208144 | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03962en_us |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-03-27T17:00:00
Updated: 2020-02-17T16:03:46
Reserved: 2017-03-03T00:00:00
Link: CVE-2017-6460
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-27T17:59:00.697
Modified: 2017-10-24T01:29:03.453
Link: CVE-2017-6460
JSON object: View
Redhat Information
No data.
CWE