VMware ESX 4.0, Patch ESX400-200911238-SG: Updates ntp (1014855)
Summaries and Symptoms
Issues fixed in this patch (and their relevant symptoms, if applicable) include:
- This fix includes an updated NTP package that fixes two security issues in the ESX service console.
This fixes a buffer overflow flaw found in the ntpq diagnostic command that might allow a reply to an ntpq
request from a malicious user that causes ntpq to fail. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-0159 to this issue.
This fixes a buffer overflow flaw in the ntpd daemon NTPv4 authentication code where if ntpd is configured to use public key cryptography for NTP packet authentication, a remote attack from a malicious user with a modified request packet might cause ntpq to fail. The Common Vulnerabilities and Exposures Project (cve.mitre.org) has assigned the name CVE-2009-1252 to this issue.
For a complete list of the issues fixed in ESX 4.0 Update 1, see the ESX 4.0 Update 1 Release Notes.
None beyond the required patch bundles and reboot information listed in the table above.
Patch Download and Installation
See the VMware vCenter Update Manager Administration Guide for instructions on using Update Manager to download and install patches to automatically update ESX 4.0 hosts.
To update ESX 4.0 hosts when not using Update Manager, download the patch zip file from http://support.vmware.com/selfsupport/download/ and install the bulletin using esxupdate from the command line of the host. For more information, see the ESX 4 Patch Management Guide.