{"id":1607,"date":"2014-12-21T13:45:14","date_gmt":"2014-12-21T11:45:14","guid":{"rendered":"http:\/\/www.zerberos.com\/?p=336"},"modified":"2014-12-21T13:45:14","modified_gmt":"2014-12-21T11:45:14","slug":"schwachstellen-ntp","status":"publish","type":"post","link":"https:\/\/www.netsolution.ch\/en\/2014\/12\/schwachstellen-ntp\/","title":{"rendered":"Schwachstellen in NTP"},"content":{"rendered":"<p>Das NTP Protokoll (Network Time Protocoll) weist gravierende Schwachstellen auf.<\/p>\n<p>Mit Puffer\u00fcberl\u00e4ufen lassen sich NTP Pakete so manipulieren dass Code mit den Berechtigungen des NTP Services auf dem Server ausgef\u00fchrt werden k\u00f6nnen.<\/p>\n<p>Entsprechende Updates wurden bereits in\u00a0einigen Distributionen ver\u00f6ffentlicht<\/p>\n<p>&gt;&gt; <a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/852879\" target=\"_blank\" rel=\"noopener\">Details<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das NTP Protokoll (Network Time Protocoll) weist gravierende Schwachstellen auf. Mit Puffer\u00fcberl\u00e4ufen lassen sich NTP Pakete so manipulieren dass Code mit den Berechtigungen des NTP Services auf dem Server ausgef\u00fchrt werden k\u00f6nnen. Entsprechende Updates wurden bereits in\u00a0einigen Distributionen ver\u00f6ffentlicht &gt;&gt; Details<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","rank_math_focus_keyword":"","rank_math_title":"","rank_math_description":"","rank_math_robots":null,"rank_math_canonical_url":"","rank_math_primary_category":"","footnotes":""},"categories":[35],"tags":[59,55],"class_list":["post-1607","post","type-post","status-publish","format-standard","hentry","category-allgemein","tag-ntp","tag-vulnerability"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"netsolution","author_link":"https:\/\/www.netsolution.ch\/en\/author\/netsolution\/"},"uagb_comment_info":0,"uagb_excerpt":"Das NTP Protokoll (Network Time Protocoll) weist gravierende Schwachstellen auf. Mit Puffer\u00fcberl\u00e4ufen lassen sich NTP Pakete so manipulieren dass Code mit den Berechtigungen des NTP Services auf dem Server ausgef\u00fchrt werden k\u00f6nnen. Entsprechende Updates wurden bereits in\u00a0einigen Distributionen ver\u00f6ffentlicht &gt;&gt; Details","_links":{"self":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts\/1607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/comments?post=1607"}],"version-history":[{"count":0,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/posts\/1607\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/media?parent=1607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/categories?post=1607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netsolution.ch\/en\/wp-json\/wp\/v2\/tags?post=1607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}