If trap service, disabled by default, has been explicitly enabled, an attacker can send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service. External References: http://support.ntp.org/bin/view/Main/NtpBug3119
Mitigation: Use "restrict default noquery ..." in your ntp.conf file. Only allow mode 6 queries from trusted networks and hosts.
Is an RPM released with fix for this. I haven't seen one @ http://mirror.centos.org. If not released, what is ETA for same? Thanks, Keyur
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2017:0252 https://rhn.redhat.com/errata/RHSA-2017-0252.html