NTP Stack Buffer Overflow Vulnerability

Summary
This host has NTP installed and is prone to stack buffer overflow vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary code or to cause the application to crash. Impact Level: Application.
Solution
Upgrade to NTP version 4.2.4p7-RC2 http://www.ntp.org/downloads.html
Insight
The flaw is due to a boundary error within the cookedprint() function in ntpq/ntpq.c while processing malicious response from a specially crafted remote time server.
Affected
NTP versions prior to 4.2.4p7-RC2 on Linux.
References