The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-2583.html | third party advisory vendor advisory |
http://www.securitytracker.com/id/1033951 | vdb entry third party advisory |
http://www.securityfocus.com/bid/77278 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-0780.html | third party advisory vendor advisory |
http://support.ntp.org/bin/view/Main/NtpBug2902 | vendor advisory |
http://www.debian.org/security/2015/dsa-3388 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1254547 | issue tracking vdb entry third party advisory |
https://security.gentoo.org/glsa/201607-15 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20171004-0001/ | third party advisory |