dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Network Time Protocol Vulnerabilities

Dec 19, 2014, 19:00 (1 Talkback[s])

Exploitation of these vulnerabilities could allow an attacker to execute arbitrary code with the privileges of the ntpd process.

Impact to individual organizations depends on many factors that are unique to each organization. ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

Complete Story


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.