Patch-ID# 140843-01


Download this patch from My Oracle Support

Your use of the firmware, software and any other materials contained in this update is subject to My Oracle Support Terms of Use, which may be viewed at My Oracle Support.
For further information on patching best practices and resources, please see the following links:
Copyright (c) 2012, Oracle and/or its affiliates. All rights reserved.

Keywords: security ntpq buffer overflow vulnerable cve-2009-0159
Synopsis: SunOS 5.8: /usr/sbin/ntpq patch
Date: Nov/03/2009


Install Requirements: NA

Solaris Release: 8

SunOS Release: 5.8

Unbundled Product:

Unbundled Release:

Xref: This patch available for x86 as patch 140844

Topic: SunOS 5.8: /usr/sbin/ntpq patch

Relevant Architectures: sparc

Bugs fixed with this patch:

Sun CR # Bug #
480480115141971
683182415557403


Changes incorporated in this version:

Patches accumulated and obsoleted by this patch:

Patches which conflict with this patch:

Patches required with this patch:

Obsoleted by:

Files included with this patch:

/usr/sbin/ntpq

Problem Description:

4804801 /usr/sbin/ntpq -c buffer overflow
6831824 ntpq vulnerable to CVE-2009-0159


Patch Installation Instructions:
--------------------------------
 
Please refer to the man pages for instructions on using 'patchadd'
and 'patchrm' commands provided with Solaris.
 
The following example installs a patch to a standalone machine:
 
       example# patchadd /var/spool/patch/123456-07
 
The following example removes a patch from a standalone system:
 
       example# patchrm 123456-07
 
For additional examples please see the appropriate man pages. Any
other special or non-generic installation instructions should be
described below as special instructions.


Special Install Instructions:
-----------------------------
 
None.


README -- Last modified date: Saturday, November 10, 2012