It was discovered that ntpq and ntpdc incorrectly handled some arguments. An attacker could possibly use this issue to cause ntpq or ntpdc to crash, execute arbitrary code, or escalate to higher privileges.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1", "binary_name": "ntp" }, { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1", "binary_name": "ntp-dbgsym" }, { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1", "binary_name": "ntp-doc" }, { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1", "binary_name": "ntpdate" }, { "binary_version": "1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1", "binary_name": "ntpdate-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.10", "binary_name": "ntp" }, { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.10", "binary_name": "ntp-dbgsym" }, { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.10", "binary_name": "ntp-doc" }, { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.10", "binary_name": "ntpdate" }, { "binary_version": "1:4.2.8p4+dfsg-3ubuntu5.10", "binary_name": "ntpdate-dbgsym" } ] }