[LWN Logo]
[LWN.net]
From:	 security@guardiandigital.com
To:	 engarde-security@guardiandigital.com
Subject: [ESA-20010409-02] xntp i386 packages available
Date:	 Thu, 26 Apr 2001 12:48:08 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


+------------------------------------------------------------------------+
| EnGarde Secure Linux Security Advisory                  April 26, 2001 |
| http://www.engardelinux.org/                           ESA-20010409-02 |
|                                                                        |
| Package:  xntp3                                                        |
| Summary:  There is a potentially exploitable buffer overflow in the    |
|           xntp3 package.                                               |
+------------------------------------------------------------------------+

  (This advisory is being re-issued to denote the release of our updated
   packages for the i386 architecture.)

  EnGarde Secure Linux is a secure distribution of Linux that features
  improved access control, host and network intrusion detection, Web
  based secure remote management, complete e-commerce using AllCommerce,
  and integrated open source security tools.


OVERVIEW
- --------
  There is a very small buffer overflow in NTP daemon which shipped with
  EnGarde Secure Linux version 1.0.1.  


DETAIL
- ------
  The Network Time Protocol (NTP) is used to synchronize a computer's
  time with another reference time source.  The xntp3 package contains
  utilities and daemons which will synchronize your computer's time to
  Coordinated Universal Time (UTC) via the NTP protocol and NTP servers.

  By attacking a very small buffer with a very small set of shellcode, an
  attacker can potentially gain root access.  It has been reported that
  in some cases the only effect is the segfault of the ntpd.


SOLUTION
- --------
  All users running 'xntp3' should upgrade to the most recent version, as
  outlined in this advisory.  All updates can be found at:

    ftp://ftp.engardelinux.org/pub/engarde/stable/updates/
    http://ftp.engardelinux.org/pub/engarde/stable/updates/

  To install the updated package, execute the command:

    rpm -Uvh <filename>

  To verify the signature of the updated packages, execute the command:

    rpm -Kv <filename>


UPDATED PACKAGES
- ----------------

  Source Packages:

    SRPMS/xntp3-5.93-1.0.16.src.rpm
      MD5 Sum:  853821174dad6b5a979f6eaae8ce815a


  i386 Binary Packages:

    i386/xntp3-5.93-1.0.16.i386.rpm
      MD5 Sum:  de6b815ccca016108cbfb305c947eb14


  i686 Binary Packages:

    i686/xntp3-5.93-1.0.16.i686.rpm
      MD5 Sum:  3d7823343a0db6485a94fa16fad5afbd


REFERENCES
- ----------

  Guardian Digital's public key:
    http://ftp.engardelinux.org/pub/engarde/ENGARDE-GPG-KEY

  Credit for the discovery of this bug goes to:
    Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL>

  The Official Web Site:
    http://www.eecis.udel.edu/~ntp/

  SecurityFocus Bug ID:
    http://www.securityfocus.com/bid/2540

  Initial Announcement on BugTraq:
    http://www.securityfocus.com/templates/archive.pike?list=1&mid=174011


- ----------------------------------------------------------------------------
$Id: 2001.04.09-xntp3,v 1.2 2001/04/26 15:18:52 rwm Exp $
- ----------------------------------------------------------------------------
Author: Ryan W. Maple, <ryan@guardiandigital.com> 
Copyright 2001, Guardian Digital, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE66FFPHD5cqd57fu0RAlk5AJ9AUPAhHqc6zdlJZjVvYRtt2+P86QCfTeBG
bB+56CeMX+wTS4IN59ou8oc=
=SKKW
-----END PGP SIGNATURE-----

------------------------------------------------------------------------
     To unsubscribe email engarde-security-request@engardelinux.org
         with "unsubscribe" in the subject of the message.

Copyright(c) 2001 Guardian Digital, Inc.                EnGardeLinux.org
------------------------------------------------------------------------