An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://dumpco.re/bugs/ntpsec-oobread2 | third party advisory exploit |
https://dumpco.re/blog/ntpsec-bugs | third party advisory exploit |
https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS | third party advisory release notes |
https://www.exploit-db.com/exploits/46176/ | third party advisory vdb entry exploit |