On Wed, Dec 24, 2014 at 05:42:16PM +0100, Andrei wrote:
> On Wed, 24 Dec 2014 00:33:09 +0100 (CET)
> FreeBSD Security Advisories <security-advisor...@freebsd.org> wrote:
> 
> > No workaround is available, but systems not running ntpd(8) are not
> > affected.  Because the issue may lead to remote root compromise, the
> > FreeBSD Security Team recommends system administrators to firewall NTP
> > ports, namely tcp/123 and udp/123 when it is not clear that all
> > systems have been patched or have ntpd(8) stopped.
> 
> Why tcp/123?
> 

 gjb@nucleus:~ % grep -i ^ntp /etc/services
 ntp             123/tcp    #Network Time Protocol
 ntp             123/udp    #Network Time Protocol

Glen

Attachment: pgpIRMpW2z7Rm.pgp
Description: PGP signature

Reply via email to