Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26241 | DoS Vulnerability in ntpd-rs |
Github GHSA |
GHSA-4855-q42w-5vr4 | DoS Vulnerability in ntpd-rs |
Tue, 02 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. In versions between 1.2.0 and 1.6.1 inclusive servers which allow non-NTS traffic are affected by a denial of service vulnerability, where an attacker can induce a message storm between two NTP servers running ntpd-rs. Client-only configurations are not affected. Affected users are recommended to upgrade to version 1.6.2 as soon as possible. | |
| Title | DoS Vulnerability in ntpd-rs | |
| Weaknesses | CWE-406 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-02T13:53:59.838Z
Reserved: 2025-08-22T14:30:32.222Z
Link: CVE-2025-58066
Updated: 2025-09-02T13:53:56.296Z
Status : Deferred
Published: 2025-08-29T21:15:36.280
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-58066
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA