CVE-2024-38528

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-38528
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38528.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38528
Aliases
Downstream
Related
Published
2024-06-28T19:28:34Z
Modified
2025-10-22T18:42:45.265336Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Unlimited number of NTS-KE connections can crash ntpd-rs server
Details

nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. There is a missing limit for accepted NTS-KE connections. This allows an unauthenticated remote attacker to crash ntpd-rs when an NTS-KE server is configured. Non NTS-KE server configurations, such as the default ntpd-rs configuration, are unaffected. This vulnerability has been patched in version 1.1.3.

Database specific
{
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Git / github.com/pendulum-project/ntpd-rs

Affected ranges

Type
GIT
Repo
https://github.com/pendulum-project/ntpd-rs
Events

Affected versions

v0.*

v0.3.1
v0.3.2
v0.3.3
v0.3.5
v0.3.6

v1.*

v1.0.0
v1.0.0-dev.20230907
v1.0.0-rc.1
v1.0.0-rc.2
v1.0.0-rc.3
v1.0.0-rc.4
v1.0.0-rc.5
v1.1.0-alpha.20231123
v1.1.1
v1.1.1-alpha.20231221
v1.1.1-alpha.20240119
v1.1.2