Remote code execution vulnerabilities in the standard implementation of the network time protocol (NTP) can be exploited by attackers to compromise servers, embedded devices and even critical infrastructure systems that run UNIX-like operating systems.
The flaws, which can be exploited by sending specially crafted packets to machines running a vulnerable version of the NTP daemon (ntpd), pose a greater threat to systems where the service runs under a highly privileged user account such as root.

The link for this article located at IT Security is no longer available.