Wind River Support Network

HomeDefectsLIN5-21666
Fixed

LIN5-21666 : Security Advisory - ntp - CVE-2016-2519

Created: Jun 13, 2016    Updated: May 29, 2018
Resolved Date: Jun 16, 2016
Found In Version: 5.0.1.35
Fix Version: 5.0.1.36
Severity: Standard
Applicable for: Wind River Linux 5
Component/s: Userspace

Description

ntpq and ntpdc can be used to store and retrieve information in ntpd. It is possible to store a data value that is larger than the size of the buffer that the ctl_getitem() function of ntpd uses to zreport the return value. If the length of the requested data value returned by ctl_getitem() is too large, the value NULL is returned instead. There are 2 cases where the return value from ctl_getitem() was not directly checked to make sure it's not NULL, but there are subsequent INSIST() checks that make sure the return value is not NULL. There are no data values ordinarily stored in ntpd that would exceed this buffer length. But if one has permission to store values and one stores a value that is "too large", then ntpd will abort if an attempt is made to read that oversized value. 

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2519 

Other Downloads


Live chat
Online