A vulnerability in BusyBox might allow remote attackers to cause a Denial of Service condition.
|Package||sys-apps/busybox on all architectures|
|Affected versions||< 1.25.1|
|Unaffected versions||>= 1.25.1|
BusyBox is a set of tools for embedded systems and is a replacement for GNU Coreutils.
The recv_and_process_client_pkt function in networking/ntpd.c in BusyBox allows remote attackers to cause a Denial of Service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
A remote attacker might send a specially crafted package to a machine running BusyBox ntpd, possibly resulting in a Denial of Service condition.
There is no known workaround at this time.
All BusyBox users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=sys-apps/busybox-1.25.1"
January 01, 2017
January 01, 2017: 1