9.1
CVSSv3

CVE-2019-6444

Published: 16/01/2019 Updated: 22/01/2019
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

An issue exists in NTPsec prior to 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ntpsec ntpsec

Vendor Advisories

Debian Bug report logs - #919513 CVE-2019-6442 CVE-2019-6443 CVE-2019-6444 CVE-2019-6445 Package: src:ntpsec; Maintainer for src:ntpsec is Richard Laager <rlaager@wiktelcom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 16 Jan 2019 19:24:02 UTC Severity: grave Tags: security Found in version ntpsec/1 ...

Exploits

#!/usr/bin/env python # Exploit Title: ntpsec 112 OOB read Proof of concept # Bug Discovery: Magnus Klaaborg Stubman (@magnusstubman) # Exploit Author: Magnus Klaaborg Stubman (@magnusstubman) # Website: dumpcore/bugs/ntpsec-oobread2 # Vendor Homepage: ntpsecorg/ # Software Link: ftp://ftpntpsecorg/pub/releases/ntpsec-112 ...
NTPsec version 112 suffers from an out-of-bounds read vulnerability in ntp_control ...