On Wed, 24 Dec 2014 00:33:09 +0100 (CET) FreeBSD Security Advisories <[email protected]> wrote:
> No workaround is available, but systems not running ntpd(8) are not > affected. Because the issue may lead to remote root compromise, the > FreeBSD Security Team recommends system administrators to firewall NTP > ports, namely tcp/123 and udp/123 when it is not clear that all > systems have been patched or have ntpd(8) stopped. Why tcp/123? Kind regards, Andrei. _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"
