ntpd has Dependency on Vulnerable Third-Party Component
Low severity
GitHub Reviewed
Published
Aug 24, 2023
in
pendulum-project/ntpd-rs
•
Updated Jun 26, 2024
Description
Published to the GitHub Advisory Database
Aug 24, 2023
Reviewed
Aug 24, 2023
Last updated
Jun 26, 2024
During startup, an attacker that can man-in-the-middle traffic to and from NTS key exchange servers can trigger a very expensive key validation process due to a vulnerability in webpki.
Impact
This vulnerability can lead to excessive cpu usage on startup on clients configured to use NTS
Patches
Affected users are recommended to upgrade to version 0.3.7
References
See also https://github.com/rustsec/advisory-db/blob/main/crates/rustls-webpki/RUSTSEC-2023-0053.md
References