Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Fedora Local Security Checks
Title:Fedora Core 11 FEDORA-2009-5674 (ntp)
The remote host is missing an update to ntp
announced via advisory FEDORA-2009-5674.

Update Information:

This update fixes a denial of service issue if autokey is enabled (default is


* Thu May 28 2009 Miroslav Lichvar 4.2.4p7-2
- fix frequency calculation when starting with no drift file
- reduce phase adjustments beyond Allan intercept in daemon PLL
* Tue May 19 2009 Miroslav Lichvar 4.2.4p7-1
- update to 4.2.4p7 (CVE-2009-1252)
- improve PLL response when kernel discipline is disabled
- don't log STA_MODE changes
- enable nanokernel support
- allow minpoll 3
- increase memlock limit
- move html documentation to -doc subpackage (#492444)


[ 1 ] Bug #499694 - CVE-2009-1252 ntp: remote arbitrary code execution vulnerability if autokeys is enabled

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update ntp' at the command line.
For more information, refer to Managing Software with yum,
available at

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1252
BugTraq ID: 35017
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
CERT/CC vulnerability note: VU#853097
Debian Security Information: DSA-1801 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-09:11
NETBSD Security Advisory: NetBSD-SA2009-006
RedHat Security Advisories: RHSA-2009:1039
RedHat Security Advisories: RHSA-2009:1040
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
CopyrightCopyright (c) 2009 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.