A vulnerability in Network Time Protocol (NTP) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to improper processing of crafted authenticated mode 6 (ntpq) packets by the affected software. An attacker who is able to authenticate a packet with a private key that is used for mode 6 authorization could exploit this vulnerability by sending a packet that submits malicious input to the targeted system. A successful exploit could trigger a NULL pointer dereference condition causing the ntpd daemon to crash, resulting in a DoS condition.
Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.
NTP.org has confirmed the vulnerability and released software updates.
Security Impact Rating: Medium