645
VMScore

CVE-2019-6443

Published: 16/01/2019 Updated: 22/01/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An issue exists in NTPsec prior to 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntpsec ntpsec

Vendor Advisories

Debian Bug report logs - #919513 CVE-2019-6442 CVE-2019-6443 CVE-2019-6444 CVE-2019-6445 Package: src:ntpsec; Maintainer for src:ntpsec is Richard Laager <rlaager@wiktelcom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 16 Jan 2019 19:24:02 UTC Severity: grave Tags: security Found in version ntpsec/1 ...

Exploits

#!/usr/bin/env python # Exploit Title: ntpsec 112 OOB read Proof of concept # Bug Discovery: Magnus Klaaborg Stubman (@magnusstubman) # Exploit Author: Magnus Klaaborg Stubman (@magnusstubman) # Website: dumpcore/bugs/ntpsec-oobread1 # Vendor Homepage: ntpsecorg/ # Software Link: ftp://ftpntpsecorg/pub/releases/ntpsec-112 ...
NTPsec version 112 suffers from an out-of-bounds read vulnerability in ctl_getitem ...