CVE-2023-33192 – ntpd
Package
Manager: cargo
Name: ntpd
Vulnerable Version: >=0.3.0 <0.3.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00197 pctl0.41849
Details
Improper handling of NTS cookie length that could crash the ntpd-rs server ### Impact ntpd-rs does not validate the length of NTS cookies in received NTP packets to the server. An attacker can crash the server by sending a specially crafted NTP packet containing a cookie shorter than what the server expects. The server also crashes when it is not configured to handle NTS packets. ntpd-rs running purely as an ntp client is not affected. ### Patches The issue was caused by improper slice indexing. The indexing operations were replaced by safer alternatives that do not crash the ntpd-rs server process but instead properly handle the error condition. A patch was released in version 0.3.3 ### Workarounds ntpd-rs running purely as an ntp client is not affected. By default, ntpd-rs packages are not configured to run as a server. For machines where serving the time is required, there is no known workaround. Users are recommended to upgrade ntpd-rs as soon as possible. ### References https://github.com/pendulum-project/ntpd-rs/pull/752 We would like to thank @mlichvar for identifying this issue
Metadata
Created: 2023-05-25T17:01:12Z
Modified: 2023-05-30T09:05:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-qwhm-h7v3-mrjx/GHSA-qwhm-h7v3-mrjx.json
CWE IDs: ["CWE-130"]
Alternative ID: GHSA-qwhm-h7v3-mrjx
Finding: F052
Auto approve: 1