A flaw in NTP was reported: If a vulnerable instance of ntpd on Windows receives a crafted malicious packet that is "too big", ntpd will stop working. Note: this flaw only affects instances of ntpd running on the Windows OS.
External References: http://support.ntp.org/bin/view/Main/NtpBug3110
Statement: This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue only affected ntpd running on the Windows OS.