Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed
I guess we should expect a whole lot of attempts to connect to the ports
used by NTP once the script kiddies figure this one out.
I probably average about 20 connect attempts to ports 53 and 111 every day.
>Vulnerability: remote root exploit
>Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL> reported that ntp
>daemons such as that released with Debian GNU/Linux are vulnerable to a
>buffer overflow that can lead to a remote root exploit. This has been
>corrected for Debian 2.2 (potato) in ntp version 4.0.99g-2potato1.
>We recommend you upgrade your ntp package immediately.
> will fetch the file for you
>dpkg -i file.deb
> will install the referenced file.
The Arthem Group
- Your number one source for web site design and hosting services