{"id":"UBUNTU-CVE-2019-6444","details":"An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.","modified":"2025-09-08T16:45:16Z","published":"2019-01-16T05:29:00Z","upstream":["CVE-2019-6444"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-6444"},{"type":"REPORT","url":"https://dumpco.re/blog/ntpsec-bugs"},{"type":"REPORT","url":"https://dumpco.re/bugs/ntpsec-oobread2"},{"type":"REPORT","url":"https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS"},{"type":"REPORT","url":"https://www.exploit-db.com/exploits/46176/"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2019-6444"}],"affected":[{"package":{"name":"ntpsec","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ntpsec@1.1.0+dfsg1-1ubuntu0.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0+dfsg1-1ubuntu0.2"}]}],"versions":["1.0.0+dfsg1-1","1.0.0+dfsg1-3","1.1.0+dfsg1-1","1.1.0+dfsg1-1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"ntpsec","binary_version":"1.1.0+dfsg1-1ubuntu0.2"},{"binary_name":"ntpsec-ntpdate","binary_version":"1.1.0+dfsg1-1ubuntu0.2"},{"binary_name":"ntpsec-ntpviz","binary_version":"1.1.0+dfsg1-1ubuntu0.2"},{"binary_name":"python3-ntp","binary_version":"1.1.0+dfsg1-1ubuntu0.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-6444.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}