Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-6443Out-of-bounds Read in Ntpsec

CWE-125Out-of-bounds Read8 documents8 sources
Severity
9.1CRITICALNVD
EPSS
43.9%
top 2.45%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 16
Latest updateMay 14

Description

An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages4 packages

NVDntpsec/ntpsec< 1.1.3
debiandebian/ntpsec< ntpsec 1.1.3+dfsg1-1 (bookworm)
Debianntpsec/ntpsec< 1.1.3+dfsg1-1+3

🔴Vulnerability Details

3
GHSA
GHSA-v24q-v22h-25r2: An issue was discovered in NTPsec before 12022-05-14
OSV
CVE-2019-6443: An issue was discovered in NTPsec before 12019-01-16
VulnCheck
ntpsec ntpsec Out-of-bounds Read2019

💥Exploits & PoCs

2
Exploit-DB
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)2019-01-16
Nuclei
NTPsec > 1.1.3 - 'ctl_getitem' Out-of-Bounds Read

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2020-64432020-04-07
Debian
CVE-2019-6443: ntpsec - An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem,...2019