A crafted malicious authenticated mode 6 (ntpq) packet from a
	  permitted network address can trigger a NULL pointer dereference,
	  crashing ntpd.
	  Note that for this attack to work, the sending
	  system must be on an address that the target's ntpd accepts mode 6
	  packets from, and must use a private key that is specifically
	  listed as being used for mode 6 authorization.
	  Impact: The ntpd daemon can crash due to the NULL pointer
	  dereference, causing a denial of service.
	  Mitigation:
	  
	    - Use restrict noquery to limit addresses that can send mode 6
	    queries.
- Limit access to the private controlkey in ntp.keys.
- Upgrade to 4.2.8p13, or later.