Arbitrary code execution vulnerability in ntpd in Apple Mac OS X - APPLE-SA-2014-12-22-1ID: oval:org.secpod.oval:def:22316 | Date: (C)2014-12-29 (M)2023-12-07 |
Class: PATCH | Family: macos |
The host is missing a security update according to Apple advisory, APPLE-SA-2014-12-22-1. The update is required to fix an arbitrary code execution vulnerability. The flaw is present in the application, which fails to handle a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function. Successful exploitation allows attackers to execute arbitrary code.
Platform: |
Apple Mac OS X 10.8 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server |