SB2017032710 - Multiple vulnerabilities in ntp



SB2017032710 - Multiple vulnerabilities in ntp

Published: March 27, 2017 Updated: August 8, 2020

Security Bulletin ID SB2017032710
Severity
Medium
Patch available
NO
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2017-6452)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing an application path on the command line. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Code Injection (CVE-ID: CVE-2017-6455)

The vulnerability allows a local authenticated user to execute arbitrary code.

NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows local users to gain privileges via a DLL in the PPSAPI_DLLS environment variable.


3) Buffer overflow (CVE-ID: CVE-2017-6459)

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via vectors related to an argument with multiple null bytes.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.