---

EnGarde Secure Linux Security Advisory: xntp i386 packages available

From:   security@guardiandigital.com
Subject:        [ESA-20010409-02] xntp i386 packages available
Date:   26 Apr 2001 12:48:08 -0400
+------------------------------------------------------------------------+ | EnGarde Secure Linux Security Advisory April 26, 2001 | | http://www.engardelinux.org/ ESA-20010409-02 | | | | Package: xntp3 | | Summary: There is a potentially exploitable buffer overflow in the | | xntp3 package. |

(This advisory is being re-issued to denote the release of our
updated packages for the i386 architecture.)

EnGarde Secure Linux is a secure distribution of Linux that
features improved access control, host and network intrusion
detection, Web based secure remote management, complete e-commerce
using AllCommerce, and integrated open source security tools.

OVERVIEW


There is a very small buffer overflow in NTP daemon which shipped
with EnGarde Secure Linux version 1.0.1.

DETAIL


The Network Time Protocol (NTP) is used to synchronize a computer’s
time with another reference time source. The xntp3 package contains
utilities and daemons which will synchronize your computer’s time
to Coordinated Universal Time (UTC) via the NTP protocol and NTP
servers.

By attacking a very small buffer with a very small set of
shellcode, an attacker can potentially gain root access. It has
been reported that in some cases the only effect is the segfault of
the ntpd.

SOLUTION


All users running ‘xntp3’ should upgrade to the most recent
version, as outlined in this advisory. All updates can be found at:

ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
http://ftp.engardelinux.org/pub/engarde/stable/updates/

To install the updated package, execute the command:

rpm -Uvh <filename>

To verify the signature of the updated packages, execute the
command:

rpm -Kv <filename>

UPDATED PACKAGES


Source Packages:

SRPMS/xntp3-5.93-1.0.16.src.rpm
MD5 Sum: 853821174dad6b5a979f6eaae8ce815a

i386 Binary Packages:

i386/xntp3-5.93-1.0.16.i386.rpm
MD5 Sum: de6b815ccca016108cbfb305c947eb14

i686 Binary Packages:

i686/xntp3-5.93-1.0.16.i686.rpm
MD5 Sum: 3d7823343a0db6485a94fa16fad5afbd

REFERENCES


Guardian Digital’s public key:
http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

Credit for the discovery of this bug goes to: Przemyslaw
Frasunek <venglin@FREEBSD.LUBLIN.PL>

The Official Web Site:
http://www.eecis.udel.edu/~ntp/

SecurityFocus Bug ID:
http://www.securityfocus.com/bid/2540

Initial Announcement on BugTraq:

http://www.securityfocus.com/templates/archive.pike?list=1&mid=174011


$Id: 2001.04.09-xntp3,v 1.2 2001/04/26 15:18:52 rwm Exp $


Author: Ryan W. Maple, <ryan@guardiandigital.com>
Copyright 2001, Guardian Digital, Inc.


To unsubscribe email engarde-security-request@engardelinux.org
with “unsubscribe” in the subject of the message. Copyright(c) 2001
Guardian Digital, Inc. EnGardeLinux.org

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis