Memory corruption vulnerability in the refclock of ntpd via an invalid length field
|ID: oval:org.secpod.oval:def:31660||Date: (C)2015-12-02 (M)2018-06-20|
|Class: VULNERABILITY||Family: unix|
The host is installed with ntp on Red Hat Enterprise Linux 5, 6 or 7 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle an invalid length field. Successful exploitation could could cause a buffer overflow potentially resulting in memory being modified.
|Red Hat Enterprise Linux 5|
|Red Hat Enterprise Linux 6|
|Red Hat Enterprise Linux 7|