The following flaw was found in ntpd: A potential path traversal vulnerability exists in the config file saving of ntpd on VMS. A specially crafted path could cause a path traversal potentially resulting in files being overwritten. An attacker could provide a malicious path to trigger this vulnerability. External References: http://talosintel.com/reports/TALOS-2015-0062/ http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner
Statement: This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue only affected OpenVMS operating systems, which use characters other than "/" and "\" for directory separation, allowing exploitation of this flaw.
Upstream patch: https://github.com/ntp-project/ntp/commit/184516e143ce4448ddb5b9876dd372008cc779f6