nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. There is a missing limit for accepted NTS-KE connections. This allows an unauthenticated remote attacker to crash ntpd-rs when an NTS-KE server is configured. Non NTS-KE server configurations, such as the default ntpd-rs configuration, are unaffected. This vulnerability has been patched in version 1.1.3.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 09:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-2xpx-vcmq-5f72 - | 
01 Jul 2024, 12:37
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
28 Jun 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-28 20:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38528
Mitre link : CVE-2024-38528
CVE.ORG link : CVE-2024-38528
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
