First published: Wed Jan 16 2019(Updated: )
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTPsec | <1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6442 is classified as a medium severity vulnerability that can lead to out-of-bounds writes.
To fix CVE-2019-6442, upgrade NTPsec to version 1.1.3 or later.
CVE-2019-6442 is caused by a flaw in the ntpd component that allows authenticated attackers to send malformed config requests.
The potential impacts of CVE-2019-6442 include crashing the NTP service and exploiting the server through out-of-bounds writes.
CVE-2019-6442 affects all versions of NTPsec prior to 1.1.3.