Date: Wed, 24 Dec 2014 17:42:16 +0100 From: Andrei <az@azsupport.com> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp Message-ID: <20141224174216.6fd47466@azsupport.com> In-Reply-To: <20141223233310.098C54BB6@nine.des.no> References: <20141223233310.098C54BB6@nine.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 24 Dec 2014 00:33:09 +0100 (CET) FreeBSD Security Advisories <security-advisories@freebsd.org> wrote: > No workaround is available, but systems not running ntpd(8) are not > affected. Because the issue may lead to remote root compromise, the > FreeBSD Security Team recommends system administrators to firewall NTP > ports, namely tcp/123 and udp/123 when it is not clear that all > systems have been patched or have ntpd(8) stopped. Why tcp/123? Kind regards, Andrei.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20141224174216.6fd47466>