Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-6444Out-of-bounds Read in Ntpsec

CWE-125Out-of-bounds Read6 documents6 sources
Severity
9.1CRITICALNVD
EPSS
12.6%
top 6.03%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 16
Latest updateMay 14

Description

An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages4 packages

NVDntpsec/ntpsec< 1.1.3
debiandebian/ntpsec< ntpsec 1.1.3+dfsg1-1 (bookworm)
Debianntpsec/ntpsec< 1.1.3+dfsg1-1+3

🔴Vulnerability Details

2
GHSA
GHSA-ggw9-jvx5-hggr: An issue was discovered in NTPsec before 12022-05-14
OSV
CVE-2019-6444: An issue was discovered in NTPsec before 12019-01-16

💥Exploits & PoCs

1
Exploit-DB
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)2019-01-16

📋Vendor Advisories

2
Chrome
Stable Channel Update for Desktop: CVE-2020-64432020-04-07
Debian
CVE-2019-6444: ntpsec - An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control...2019