Linux Today: Linux News On Internet Time.

More on LinuxToday

Network Time Protocol Vulnerabilities

Dec 19, 2014, 19:00 (1 Talkback[s])

Exploitation of these vulnerabilities could allow an attacker to execute arbitrary code with the privileges of the ntpd process.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

Complete Story