First published: Wed Jan 16 2019(Updated: )
An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NTPsec | <1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6444 is classified as a medium severity vulnerability.
CVE-2019-6444 allows an attacker to perform a stack-based buffer over-read through crafted data.
CVE-2019-6444 affects NTPsec versions before 1.1.3.
You can mitigate CVE-2019-6444 by upgrading to NTPsec version 1.1.3 or later.
CVE-2019-6444 involves the dereferencing of attacker-controlled data which leads to a buffer over-read.