An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.Referenceshttps://dumpco.re/bugs/ntpsec-oobread2https://dumpco.re/blog/ntpsec-bugshttps://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWShttps://www.exploit-db.com/exploits/46176/