Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through
4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an
ntpq query and sending a response with a crafted array.
@Maintainers could you confirm if we are affected in stable version 4.2.8_p10-r1?
*** This bug has been marked as a duplicate of bug 649612 ***