CVE-2023-33192: Improper handling of NTS cookie length that could crash the ntpd-rs server
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.41979%
CWE
Published
5/25/2023
Updated
11/4/2023
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ntpd | rust | >= 0.3.0, < 0.3.3 | 0.3.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper slice indexing during NTS cookie processing. The patch replaced direct slicing with safe methods (like get() instead of []), indicating the original code accessed cookie data without proper bounds checks. The server crash occurs in NTS packet handling, pointing to functions in the NTS key server and packet decoding logic. The high confidence comes from: 1) Explicit mention of slice indexing fixes in the patch description 2) Server-specific impact aligning with key server components 3) Cookie decoding being the primary attack vector mentioned in CWE-130 context.