Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
2009-05-19T19:30:00.670
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | ntp | ntp | 4.2.4p0 | Yes |
| Application | ntp | ntp | 4.2.4p1 | Yes |
| Application | ntp | ntp | 4.2.4p2 | Yes |
| Application | ntp | ntp | 4.2.4p3 | Yes |
| Application | ntp | ntp | 4.2.4p4 | Yes |
| Application | ntp | ntp | 4.2.4p5 | Yes |
| Application | ntp | ntp | 4.2.4p6 | Yes |
| Application | ntp | ntp | 4.2.5p0 | Yes |
| Application | ntp | ntp | 4.2.5p1 | Yes |
| Application | ntp | ntp | 4.2.5p2 | Yes |
| Application | ntp | ntp | 4.2.5p3 | Yes |
| Application | ntp | ntp | 4.2.5p4 | Yes |
| Application | ntp | ntp | 4.2.5p5 | Yes |
| Application | ntp | ntp | 4.2.5p6 | Yes |
| Application | ntp | ntp | 4.2.5p7 | Yes |
| Application | ntp | ntp | 4.2.5p8 | Yes |
| Application | ntp | ntp | 4.2.5p9 | Yes |
| Application | ntp | ntp | 4.2.5p10 | Yes |
| Application | ntp | ntp | 4.2.5p11 | Yes |
| Application | ntp | ntp | 4.2.5p12 | Yes |
| Application | ntp | ntp | 4.2.5p13 | Yes |
| Application | ntp | ntp | 4.2.5p14 | Yes |
| Application | ntp | ntp | 4.2.5p15 | Yes |
| Application | ntp | ntp | 4.2.5p16 | Yes |
| Application | ntp | ntp | 4.2.5p17 | Yes |
| Application | ntp | ntp | 4.2.5p18 | Yes |
| Application | ntp | ntp | 4.2.5p19 | Yes |
| Application | ntp | ntp | 4.2.5p20 | Yes |
| Application | ntp | ntp | 4.2.5p21 | Yes |
| Application | ntp | ntp | 4.2.5p23 | Yes |
| Application | ntp | ntp | 4.2.5p24 | Yes |
| Application | ntp | ntp | 4.2.5p25 | Yes |
| Application | ntp | ntp | 4.2.5p26 | Yes |
| Application | ntp | ntp | 4.2.5p27 | Yes |
| Application | ntp | ntp | 4.2.5p28 | Yes |
| Application | ntp | ntp | 4.2.5p29 | Yes |
| Application | ntp | ntp | 4.2.5p30 | Yes |
| Application | ntp | ntp | 4.2.5p31 | Yes |
| Application | ntp | ntp | 4.2.5p32 | Yes |
| Application | ntp | ntp | 4.2.5p33 | Yes |
| Application | ntp | ntp | 4.2.5p35 | Yes |
| Application | ntp | ntp | 4.2.5p36 | Yes |
| Application | ntp | ntp | 4.2.5p37 | Yes |
| Application | ntp | ntp | 4.2.5p38 | Yes |
| Application | ntp | ntp | 4.2.5p39 | Yes |
| Application | ntp | ntp | 4.2.5p40 | Yes |
| Application | ntp | ntp | 4.2.5p41 | Yes |
| Application | ntp | ntp | 4.2.5p42 | Yes |
| Application | ntp | ntp | 4.2.5p43 | Yes |
| Application | ntp | ntp | 4.2.5p44 | Yes |
| Application | ntp | ntp | 4.2.5p45 | Yes |
| Application | ntp | ntp | 4.2.5p46 | Yes |
| Application | ntp | ntp | 4.2.5p47 | Yes |
| Application | ntp | ntp | 4.2.5p48 | Yes |
| Application | ntp | ntp | 4.2.5p49 | Yes |
| Application | ntp | ntp | 4.2.5p50 | Yes |
| Application | ntp | ntp | 4.2.5p51 | Yes |
| Application | ntp | ntp | 4.2.5p52 | Yes |
| Application | ntp | ntp | 4.2.5p53 | Yes |
| Application | ntp | ntp | 4.2.5p54 | Yes |
| Application | ntp | ntp | 4.2.5p55 | Yes |
| Application | ntp | ntp | 4.2.5p56 | Yes |
| Application | ntp | ntp | 4.2.5p57 | Yes |
| Application | ntp | ntp | 4.2.5p58 | Yes |
| Application | ntp | ntp | 4.2.5p59 | Yes |
| Application | ntp | ntp | 4.2.5p60 | Yes |
| Application | ntp | ntp | 4.2.5p61 | Yes |
| Application | ntp | ntp | 4.2.5p62 | Yes |
| Application | ntp | ntp | 4.2.5p63 | Yes |
| Application | ntp | ntp | 4.2.5p64 | Yes |
| Application | ntp | ntp | 4.2.5p65 | Yes |
| Application | ntp | ntp | 4.2.5p66 | Yes |
| Application | ntp | ntp | 4.2.5p67 | Yes |
| Application | ntp | ntp | 4.2.5p68 | Yes |
| Application | ntp | ntp | 4.2.5p69 | Yes |
| Application | ntp | ntp | 4.2.5p70 | Yes |
| Application | ntp | ntp | 4.2.5p71 | Yes |
| Application | ntp | ntp | 4.2.5p73 | Yes |