ALT-PU-2014-1213-1
Closed vulnerabilities
BDU:2015-02159
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02160
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02161
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02162
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02163
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06447
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06448
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08486
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08487
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09365
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации
BDU:2015-09376
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09749
Уязвимость демона ntpd реализации протокола синхронизации времени NTP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-09
CVE-2009-0021
NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://secunia.com/advisories/33406
- http://secunia.com/advisories/33558
- http://secunia.com/advisories/33648
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35074
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177
- http://support.apple.com/kb/HT3549
- http://www.ocert.org/advisories/ocert-2008-016.html
- http://www.redhat.com/support/errata/RHSA-2009-0046.html
- http://www.securityfocus.com/archive/1/499827/100/0/threaded
- http://www.securitytracker.com/id?1021533
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vupen.com/english/advisories/2009/0042
- http://www.vupen.com/english/advisories/2009/1297
- https://lists.ntp.org/pipermail/announce/2009-January/000055.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10035
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://secunia.com/advisories/33406
- http://secunia.com/advisories/33558
- http://secunia.com/advisories/33648
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35074
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.531177
- http://support.apple.com/kb/HT3549
- http://www.ocert.org/advisories/ocert-2008-016.html
- http://www.redhat.com/support/errata/RHSA-2009-0046.html
- http://www.securityfocus.com/archive/1/499827/100/0/threaded
- http://www.securitytracker.com/id?1021533
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vupen.com/english/advisories/2009/0042
- http://www.vupen.com/english/advisories/2009/1297
- https://lists.ntp.org/pipermail/announce/2009-January/000055.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10035
Modified: 2025-04-09
CVE-2009-0159
Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc
- http://bugs.pardus.org.tr/show_bug.cgi?id=9532
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
- http://marc.info/?l=bugtraq&m=136482797910018&w=2
- http://marc.info/?l=bugtraq&m=136482797910018&w=2
- http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565
- http://osvdb.org/53593
- http://rhn.redhat.com/errata/RHSA-2009-1039.html
- http://rhn.redhat.com/errata/RHSA-2009-1040.html
- http://secunia.com/advisories/34608
- http://secunia.com/advisories/35074
- http://secunia.com/advisories/35137
- http://secunia.com/advisories/35138
- http://secunia.com/advisories/35166
- http://secunia.com/advisories/35169
- http://secunia.com/advisories/35253
- http://secunia.com/advisories/35308
- http://secunia.com/advisories/35336
- http://secunia.com/advisories/35416
- http://secunia.com/advisories/35630
- http://secunia.com/advisories/37471
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238
- http://support.apple.com/kb/HT3549
- http://www.debian.org/security/2009/dsa-1801
- http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:092
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/34481
- http://www.securitytracker.com/id?1022033
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/0999
- http://www.vupen.com/english/advisories/2009/1297
- http://www.vupen.com/english/advisories/2009/3316
- https://bugzilla.redhat.com/show_bug.cgi?id=490617
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49838
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19392
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5411
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8386
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8665
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634
- https://rhn.redhat.com/errata/RHSA-2009-1651.html
- https://support.ntp.org/bugs/show_bug.cgi?id=1144
- https://usn.ubuntu.com/777-1/
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc
- http://bugs.pardus.org.tr/show_bug.cgi?id=9532
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
- http://marc.info/?l=bugtraq&m=136482797910018&w=2
- http://marc.info/?l=bugtraq&m=136482797910018&w=2
- http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565
- http://osvdb.org/53593
- http://rhn.redhat.com/errata/RHSA-2009-1039.html
- http://rhn.redhat.com/errata/RHSA-2009-1040.html
- http://secunia.com/advisories/34608
- http://secunia.com/advisories/35074
- http://secunia.com/advisories/35137
- http://secunia.com/advisories/35138
- http://secunia.com/advisories/35166
- http://secunia.com/advisories/35169
- http://secunia.com/advisories/35253
- http://secunia.com/advisories/35308
- http://secunia.com/advisories/35336
- http://secunia.com/advisories/35416
- http://secunia.com/advisories/35630
- http://secunia.com/advisories/37471
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.566238
- http://support.apple.com/kb/HT3549
- http://www.debian.org/security/2009/dsa-1801
- http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:092
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/bid/34481
- http://www.securitytracker.com/id?1022033
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/0999
- http://www.vupen.com/english/advisories/2009/1297
- http://www.vupen.com/english/advisories/2009/3316
- https://bugzilla.redhat.com/show_bug.cgi?id=490617
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49838
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19392
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5411
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8386
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8665
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634
- https://rhn.redhat.com/errata/RHSA-2009-1651.html
- https://support.ntp.org/bugs/show_bug.cgi?id=1144
- https://usn.ubuntu.com/777-1/
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html
Modified: 2025-04-11
CVE-2013-5211
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc
- http://bugs.ntp.org/show_bug.cgi?id=1532
- http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04
- http://lists.ntp.org/pipermail/pool/2011-December/005616.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html
- http://marc.info/?l=bugtraq&m=138971294629419&w=2
- http://marc.info/?l=bugtraq&m=138971294629419&w=2
- http://marc.info/?l=bugtraq&m=144182594518755&w=2
- http://openwall.com/lists/oss-security/2013/12/30/6
- http://openwall.com/lists/oss-security/2013/12/30/7
- http://secunia.com/advisories/59288
- http://secunia.com/advisories/59726
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892
- http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz
- http://www.kb.cert.org/vuls/id/348126
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/64692
- http://www.securitytracker.com/id/1030433
- http://www.us-cert.gov/ncas/alerts/TA14-013A
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232
- https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc
- http://bugs.ntp.org/show_bug.cgi?id=1532
- http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04
- http://lists.ntp.org/pipermail/pool/2011-December/005616.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html
- http://marc.info/?l=bugtraq&m=138971294629419&w=2
- http://marc.info/?l=bugtraq&m=138971294629419&w=2
- http://marc.info/?l=bugtraq&m=144182594518755&w=2
- http://openwall.com/lists/oss-security/2013/12/30/6
- http://openwall.com/lists/oss-security/2013/12/30/7
- http://secunia.com/advisories/59288
- http://secunia.com/advisories/59726
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892
- http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz
- http://www.kb.cert.org/vuls/id/348126
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/64692
- http://www.securitytracker.com/id/1030433
- http://www.us-cert.gov/ncas/alerts/TA14-013A
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232
- https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory
Closed bugs
update current 4.2.4 to upstream production ver 4.2.6
Упакованы "лишние" man-страницы