Files
CVEs-PoC/2014/CVE-2014-9295.md
T
2024-06-18 02:51:15 +02:00

24 lines
1.1 KiB
Markdown

### [CVE-2014-9295](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
### POC
#### Reference
- http://www.kb.cert.org/vuls/id/852879
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
#### Github
- https://github.com/MacMiniVault/NTPUpdateSnowLeopard
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/oneoy/cve-
- https://github.com/opragel/osx-10.7-ntp
- https://github.com/sous-chefs/ntp