Resolution for ntp Multiple Buffer Overflows via Specially Crafted Packets (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296) in Red Hat Enterprise Linux
Issue
- Resolution for ntp Multiple Buffer Overflows via Specially Crafted Packets (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296) in Red Hat Enterprise Linux.
- How do I avoid impact to a Red Hat Enterprise Linux system from CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, and CVE-2014-9296 in Red Hat Enterprise Linux ?
- Regarding the Network Time Protocol Vulnerabilities Advisory ICSA-14-353-01, what should I do?
Environment
- Red Hat Enterprise Linux 7
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
- Red Hat Enterprise Linux 6
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
- Red Hat Enterprise Linux 5
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295
- ntp, ntpdate
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.