The Windows installer for NTP calls strcpy() with an argument that specifically contains multiple null bytes. strcpy() only copies a single terminating null character into the target buffer instead of copying the required double null bytes in the addKeysToRegistry() function. As a consequence, a garbage registry entry can be created. The additional arsize parameter is erroneously set to contain two null bytes and the following call to RegSetValueEx() claims to be passing in a multi-string value, though this may not be true. Upstream bug: http://support.ntp.org/bin/view/Main/NtpBug3382 References: http://support.ntp.org/bin/view/Main/SecurityNotice#March_2017_ntp_4_2_8p10_NTP_Secu
Acknowledgments: Name: the NTP project Upstream: Cure53
Statement: This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux.