** Changed in: ntp (Debian)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1268543

Title:
  CVE-2013-5211 ntp DDos

Status in ntp package in Ubuntu:
  Won't Fix
Status in ntp package in Debian:
  Fix Released

Bug description:
  The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26
  allows remote attackers to cause a denial of service (traffic
  amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1
  requests, as exploited in the wild in December 2013.

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211

  http://bugs.ntp.org/show_bug.cgi?id=1532

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1268543/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to