An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
https://www.exploit-db.com/exploits/46176/
https://github.com/ntpsec/ntpsec/blob/NTPsec_1_1_3/NEWS