<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NTP Vuln - Cert VU#852879 / CVE-2014-9295 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24930#M18196</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you have a threat id number the best place to check is the threat vault.&amp;nbsp; Simply search on the number and it will return where the signature exists if there is one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;Ntpd Remote Buffer Overflow Vulnerability&lt;/H1&gt;&lt;P style="margin-left: 2px; margin-top: -15px;"&gt; &lt;SMALL&gt; Signature ID : 37198&lt;BR /&gt; &lt;/SMALL&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Description &lt;/TD&gt;&lt;TD&gt; Ntp daemon 4.2.7 and earlier are prone to a buffer overflow vulnerability while parsing certain crafted NTP requests. The vulnerability is due to the lack of boundary checks while parsing certain arguments passed in a request. It could lead to an exploitable stack overflow. An attacker could exploit the vulnerability by sending a crafted NTP request that could allow remote code execution with the privileges of the server. &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; References &lt;/TD&gt;&lt;TD&gt; &lt;A href="http://www.kb.cert.org/vuls/id/852879" target="_blank"&gt;http://www.kb.cert.org/vuls/id/852879&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Severity &lt;/TD&gt;&lt;TD&gt; critical &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Category &lt;/TD&gt;&lt;TD&gt; overflow &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Default action &lt;/TD&gt;&lt;TD&gt; alert &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; CVE &lt;/TD&gt;&lt;TD&gt; CVE-2014-9295 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 27 Dec 2014 15:57:08 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-12-27T15:57:08Z</dc:date>
    <item>
      <title>NTP Vuln - Cert VU#852879 / CVE-2014-9295</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24927#M18193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01" title="https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01"&gt;Network Time Protocol Vulnerabilities | ICS-CERT&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://support.ntp.org/bin/view/Main/SecurityNotice" title="http://support.ntp.org/bin/view/Main/SecurityNotice"&gt;http://support.ntp.org/bin/view/Main/SecurityNotice&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/cve/CVE-2014-9295" title="https://access.redhat.com/security/cve/CVE-2014-9295"&gt;access.redhat.com | CVE-2014-9295&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://arstechnica.com/security/2014/12/attack-code-exploiting-critical-bugs-in-net-time-sync-puts-servers-at-risk/"&gt;http://arstechnica.com/security/2014/12/attack-code-exploiting-critical-bugs-in-net-time-sync-puts-servers-at-risk/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2014 02:58:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24927#M18193</guid>
      <dc:creator>cmcguire-coactive</dc:creator>
      <dc:date>2014-12-21T02:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Vuln - Cert VU#852879 / CVE-2014-9295</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24928#M18194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/8889"&gt;coactive&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this has been covered in Content release 478&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Dec 2014 08:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24928#M18194</guid>
      <dc:creator>bat</dc:creator>
      <dc:date>2014-12-24T08:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Vuln - Cert VU#852879 / CVE-2014-9295</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24929#M18195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can confirm, IPS signature for CVE-2014-9295 is included in content update 478.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Dec 2014 11:02:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24929#M18195</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-12-24T11:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: NTP Vuln - Cert VU#852879 / CVE-2014-9295</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24930#M18196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you have a threat id number the best place to check is the threat vault.&amp;nbsp; Simply search on the number and it will return where the signature exists if there is one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" title="https://threatvault.paloaltonetworks.com/"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H1&gt;Ntpd Remote Buffer Overflow Vulnerability&lt;/H1&gt;&lt;P style="margin-left: 2px; margin-top: -15px;"&gt; &lt;SMALL&gt; Signature ID : 37198&lt;BR /&gt; &lt;/SMALL&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Description &lt;/TD&gt;&lt;TD&gt; Ntp daemon 4.2.7 and earlier are prone to a buffer overflow vulnerability while parsing certain crafted NTP requests. The vulnerability is due to the lack of boundary checks while parsing certain arguments passed in a request. It could lead to an exploitable stack overflow. An attacker could exploit the vulnerability by sending a crafted NTP request that could allow remote code execution with the privileges of the server. &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; References &lt;/TD&gt;&lt;TD&gt; &lt;A href="http://www.kb.cert.org/vuls/id/852879" target="_blank"&gt;http://www.kb.cert.org/vuls/id/852879&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Severity &lt;/TD&gt;&lt;TD&gt; critical &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; Category &lt;/TD&gt;&lt;TD&gt; overflow &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder" style="background: none repeat scroll 0% 0% #d6e1e7;"&gt;&lt;TD&gt; Default action &lt;/TD&gt;&lt;TD&gt; alert &lt;/TD&gt;&lt;/TR&gt;&lt;TR class="spaceunder"&gt;&lt;TD&gt; CVE &lt;/TD&gt;&lt;TD&gt; CVE-2014-9295 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Dec 2014 15:57:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ntp-vuln-cert-vu-852879-cve-2014-9295/m-p/24930#M18196</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-12-27T15:57:08Z</dc:date>
    </item>
  </channel>
</rss>

