{"id":"USN-2449-1","summary":"ntp vulnerabilities","details":"Neel Mehta discovered that NTP generated weak authentication keys. A remote\nattacker could possibly use this issue to brute force the authentication\nkey and send requests if permitted by IP restrictions. (CVE-2014-9293)\n\nStephen Roettger discovered that NTP generated weak MD5 keys. A remote\nattacker could possibly use this issue to brute force the MD5 key and spoof\na client or server. (CVE-2014-9294)\n\nStephen Roettger discovered that NTP contained buffer overflows in the\ncrypto_recv(), ctl_putdata() and configure() functions. In non-default\nconfigurations, a remote attacker could use these issues to cause NTP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. The default compiler options for affected releases should reduce the\nvulnerability to a denial of service. In addition, attackers would be\nisolated by the NTP AppArmor profile. (CVE-2014-9295)\n\nStephen Roettger discovered that NTP incorrectly continued processing when\nhandling certain errors. (CVE-2014-9296)\n","modified":"2026-02-10T04:40:51Z","published":"2014-12-22T13:12:53Z","related":["UBUNTU-CVE-2014-9293","UBUNTU-CVE-2014-9294","UBUNTU-CVE-2014-9295","UBUNTU-CVE-2014-9296"],"upstream":["CVE-2014-9293","CVE-2014-9294","CVE-2014-9295","CVE-2014-9296","UBUNTU-CVE-2014-9293","UBUNTU-CVE-2014-9294","UBUNTU-CVE-2014-9295","UBUNTU-CVE-2014-9296"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2449-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9293"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9294"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9295"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9296"}],"affected":[{"package":{"name":"ntp","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/ntp@1:4.2.6.p5+dfsg-3ubuntu2.14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.1"}]}],"versions":["1:4.2.6.p5+dfsg-3ubuntu2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"ntp","binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.1"},{"binary_name":"ntpdate","binary_version":"1:4.2.6.p5+dfsg-3ubuntu2.14.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2449-1.json","cves_map":{"cves":[{"id":"CVE-2014-9293","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2014-9294","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2014-9295","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2014-9296","severity":[{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}