| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ntpd |
| rust |
| < 0.3.7 |
| 0.3.7 |
The vulnerability stems from a dependency on an outdated version of rustls-webpki (CVE-2018-16875 via RUSTSEC-2023-0053) rather than specific functions in ntpd-rs itself. The key issue was in rustls-webpki's certificate path-building logic, which could be exploited to cause excessive CPU usage during NTS key validation(). The ntpd-rs codebase patched this by updating dependencies (rustls-webpki to >=0.101.4) rather than modifying its own functions. No specific vulnerable functions were identified in ntpd-rs' code - the risk existed purely through the vulnerable third-party component's certificate validation routines.
KEV Misses 88% of Exploited CVEs- Get the report