ArchLinux: 201507-5: ntp: denial of service
Summary
Under limited and specific circumstances an attacker can send a crafted remote-configuration packet containing a NUL-byte to cause a vulnerable ntpd instance to crash. This requires each of the following to be true: - ntpd set up to allow for remote configuration (not allowed by default) - knowledge of the configuration password - access to a computer entrusted to perform remote configuration
Resolution
Upgrade to 4.2.8.p3-1.
# pacman -Syu "ntp>=4.2.8.p3-1"
The problem has been fixed upstream in version 4.2.8.p3.
References
https://www.ntp.org/support/securitynotice/ https://access.redhat.com/security/cve/CVE-2015-5146
Workaround
Configure ntpd to not allow remote configuration (default setting).