Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-6444

An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.106
EPSS Ranking 92.9%
CVSS Severity
CVSS v3 Score 9.1
CVSS v2 Score 6.4
Products affected by CVE-2019-6444
  • Ntpsec » Ntpsec » Version: 0.9.0
    cpe:2.3:a:ntpsec:ntpsec:0.9.0
  • Ntpsec » Ntpsec » Version: 0.9.1
    cpe:2.3:a:ntpsec:ntpsec:0.9.1
  • Ntpsec » Ntpsec » Version: 0.9.2
    cpe:2.3:a:ntpsec:ntpsec:0.9.2
  • Ntpsec » Ntpsec » Version: 0.9.3
    cpe:2.3:a:ntpsec:ntpsec:0.9.3
  • Ntpsec » Ntpsec » Version: 0.9.4
    cpe:2.3:a:ntpsec:ntpsec:0.9.4
  • Ntpsec » Ntpsec » Version: 0.9.5
    cpe:2.3:a:ntpsec:ntpsec:0.9.5
  • Ntpsec » Ntpsec » Version: 0.9.5.1
    cpe:2.3:a:ntpsec:ntpsec:0.9.5.1
  • Ntpsec » Ntpsec » Version: 0.9.6
    cpe:2.3:a:ntpsec:ntpsec:0.9.6
  • Ntpsec » Ntpsec » Version: 0.9.7
    cpe:2.3:a:ntpsec:ntpsec:0.9.7
  • Ntpsec » Ntpsec » Version: 0.9.8
    cpe:2.3:a:ntpsec:ntpsec:0.9.8
  • Ntpsec » Ntpsec » Version: 1.0.0
    cpe:2.3:a:ntpsec:ntpsec:1.0.0
  • Ntpsec » Ntpsec » Version: 1.1.0
    cpe:2.3:a:ntpsec:ntpsec:1.1.0
  • Ntpsec » Ntpsec » Version: 1.1.1
    cpe:2.3:a:ntpsec:ntpsec:1.1.1
  • Ntpsec » Ntpsec » Version: 1.1.2
    cpe:2.3:a:ntpsec:ntpsec:1.1.2


Contact Us

Shodan ® - All rights reserved