Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

NTP:MUL-NTP-DAEMON-AUTOKEY-BOF

Severity

Major

Recommended

No

Recommended Action

Drop

Category

NTP

Keywords

Multiple Vendors NTP Daemon Autokey Stack Buffer Overflow

Release Date

2011/07/21

Update Number

1959

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

NTP: Multiple Vendors NTP Daemon Autokey Stack Buffer Overflow


This signature detects attempts to exploit a known vulnerability in Multiple Vendors NTP Daemon. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

The 'ntpd' daemon is prone to a stack-based buffer-overflow vulnerability when it is configured to use the 'autokey' OpenSSL protocol. Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed attempts will likely crash the application, causing denial-of-service conditions.

Affected Products

  • Avaya aura_application_enablement_services 4.0
  • Avaya aura_session_manager 1.1
  • Avaya aura_sip_enablement_services 3.1.1
  • Avaya aura_sip_enablement_services 5.0
  • Avaya communication_manager 2.0.0
  • Avaya communication_manager 2.0.1
  • Avaya communication_manager 2.1
  • Avaya communication_manager 2.2
  • Avaya communication_manager 3.0
  • Avaya communication_manager 3.1
  • Avaya communication_manager 3.1.4 SP2
  • Avaya communication_manager 4.0
  • Avaya communication_manager 4.0.3 SP1
  • Avaya intuity_audix_lx 2.0
  • Avaya intuity_audix_lx 2.0 SP1
  • Avaya intuity_audix_lx 2.0 SP2
  • Avaya message_networking 3.1
  • Avaya proactive_contact 4.0
  • Avaya proactive_contact 4.1
  • Avaya voice_portal 4.0
  • Avaya voice_portal 5.0
  • Debian linux 4.0
  • Debian linux 4.0 Alpha
  • Debian linux 4.0 Amd64
  • Debian linux 4.0 Arm
  • Debian linux 4.0 Armel
  • Debian linux 4.0 Hppa
  • Debian linux 4.0 Ia-32
  • Debian linux 4.0 Ia-64
  • Debian linux 4.0 M68k
  • Debian linux 4.0 Mips
  • Debian linux 4.0 Mipsel
  • Debian linux 4.0 Powerpc
  • Debian linux 4.0 S/390
  • Debian linux 4.0 Sparc
  • Debian linux 5.0
  • Debian linux 5.0 Alpha
  • Debian linux 5.0 Amd64
  • Debian linux 5.0 Arm
  • Debian linux 5.0 Armel
  • Debian linux 5.0 Hppa
  • Debian linux 5.0 Ia-32
  • Debian linux 5.0 Ia-64
  • Debian linux 5.0 M68k
  • Debian linux 5.0 Mips
  • Debian linux 5.0 Mipsel
  • Debian linux 5.0 Powerpc
  • Debian linux 5.0 S/390
  • Debian linux 5.0 Sparc
  • Freebsd freebsd 6.3-RELEASE-P11
  • Freebsd freebsd 6.4-RELEASE-P5
  • Freebsd freebsd 6.4 -STABLE
  • Freebsd freebsd 7.1-RELEASE-P6
  • Freebsd freebsd 7.1-STABLE
  • Freebsd freebsd 7.2-RELEASE-P1
  • Freebsd freebsd 7.2-STABLE
  • Gentoo linux
  • Hp tcp/ip_services_for_openvms_alpha 5.4
  • Hp tcp/ip_services_for_openvms_alpha 5.5
  • Hp tcp/ip_services_for_openvms_alpha 5.6
  • Hp tcp/ip_services_for_openvms_i64 5.4
  • Hp tcp/ip_services_for_openvms_i64 5.5
  • Hp tcp/ip_services_for_openvms_i64 5.6
  • Mandriva corporate_server 3.0.0
  • Mandriva corporate_server 3.0.0 X86 64
  • Mandriva corporate_server 4.0
  • Mandriva corporate_server 4.0.0 X86 64
  • Mandriva linux_mandrake 2008.0
  • Mandriva linux_mandrake 2008.0 X86 64
  • Mandriva linux_mandrake 2008.1
  • Mandriva linux_mandrake 2008.1 X86 64
  • Mandriva linux_mandrake 2009.0
  • Mandriva linux_mandrake 2009.0 X86 64
  • Mandriva linux_mandrake 2009.1
  • Mandriva linux_mandrake 2009.1 X86 64
  • Mandriva multi_network_firewall 2.0.0
  • Netbsd netbsd 4.0
  • Netbsd netbsd 4.0.1
  • Netbsd netbsd 5.0
  • Ntp ntp 4.2.4P5
  • Ntp ntp 4.2.4P6
  • Ntp ntp 4.2.4P7-RC2
  • Ntp ntpd 3.0.0
  • Ntp ntpd 4.0.0
  • Ntp ntpd 4.1.0
  • Ntp ntpd 4.2.0
  • Ntp ntpd 4.2.0 .0A
  • Ntp ntpd 4.2.0 .0B
  • Ntp ntpd 4.2.1
  • Pardus linux_2008
  • Red_hat desktop 4.0.0
  • Red_hat enterprise_linux 5 Server
  • Red_hat enterprise_linux_as 4
  • Red_hat enterprise_linux_desktop 5 Client
  • Red_hat enterprise_linux_es 4
  • Red_hat enterprise_linux_eus 5.3.Z Server
  • Red_hat enterprise_linux_ws 4
  • Red_hat fedora 10
  • Red_hat fedora 11
  • Red_hat fedora 12
  • Red_hat fedora 9
  • Rpath appliance_platform_linux_service 1
  • Rpath appliance_platform_linux_service 2
  • Rpath rpath_linux 1
  • Rpath rpath_linux 2
  • Slackware linux 10.0.0
  • Slackware linux 10.1.0
  • Slackware linux 10.2.0
  • Slackware linux 11.0
  • Slackware linux 12.0
  • Slackware linux 12.1
  • Slackware linux 12.2
  • Slackware linux 8.1.0
  • Slackware linux 9.0.0
  • Slackware linux 9.1.0
  • Slackware linux -Current
  • Suse novell_linux_desktop 9.0.0
  • Suse open-enterprise-server
  • Suse opensuse 10.3
  • Suse opensuse 11.0
  • Suse opensuse 11.1
  • Suse suse_linux_enterprise 10
  • Suse suse_linux_enterprise 11
  • Suse suse_linux_enterprise_server 9
  • Ubuntu ubuntu_linux 6.06 LTS Amd64
  • Ubuntu ubuntu_linux 6.06 LTS I386
  • Ubuntu ubuntu_linux 6.06 LTS Powerpc
  • Ubuntu ubuntu_linux 6.06 LTS Sparc
  • Ubuntu ubuntu_linux 8.04 LTS Amd64
  • Ubuntu ubuntu_linux 8.04 LTS I386
  • Ubuntu ubuntu_linux 8.04 LTS Lpia
  • Ubuntu ubuntu_linux 8.04 LTS Powerpc
  • Ubuntu ubuntu_linux 8.04 LTS Sparc
  • Ubuntu ubuntu_linux 8.10 Amd64
  • Ubuntu ubuntu_linux 8.10 I386
  • Ubuntu ubuntu_linux 8.10 Lpia
  • Ubuntu ubuntu_linux 8.10 Powerpc
  • Ubuntu ubuntu_linux 8.10 Sparc
  • Ubuntu ubuntu_linux 9.04 Amd64
  • Ubuntu ubuntu_linux 9.04 I386
  • Ubuntu ubuntu_linux 9.04 Lpia
  • Ubuntu ubuntu_linux 9.04 Powerpc
  • Ubuntu ubuntu_linux 9.04 Sparc
  • Vmware esxi_server 3.5
  • Vmware esxi_server 3.5 Esxe350-200904402-T-BG
  • Vmware esxi_server 3.5 Esxe350-200910401-I-SG
  • Vmware esxi_server 4.0
  • Vmware esxi_server 4.0 Esxi400-200909401-BG

References

  • BugTraq: 35017
  • CVE: CVE-2009-1252

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out