Search Job

Wednesday, December 24, 2014

Re: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp

On Wed, 24 Dec 2014 00:33:09 +0100 (CET)
FreeBSD Security Advisories <security-advisories@freebsd.org> wrote:

> No workaround is available, but systems not running ntpd(8) are not
> affected. Because the issue may lead to remote root compromise, the
> FreeBSD Security Team recommends system administrators to firewall NTP
> ports, namely tcp/123 and udp/123 when it is not clear that all
> systems have been patched or have ntpd(8) stopped.

Why tcp/123?

Kind regards,
Andrei.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"

No comments:

Post a Comment