An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
References
Link | Resource |
---|---|
https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS | Release Notes Third Party Advisory |
https://dumpco.re/bugs/ntpsec-oobread2 | Exploit Third Party Advisory |
https://dumpco.re/blog/ntpsec-bugs | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46176/ | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-01-15 21:29
Updated : 2019-01-22 06:44
NVD link : CVE-2019-6444
Mitre link : CVE-2019-6444
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
ntpsec
- ntpsec