The read_from_cmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchange of NOHOSTACCESS messages between two daemons, a related issue to CVE-2009-3563.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://chrony.tuxfamily.org/News.html - Vendor Advisory | |
References | () http://git.tuxfamily.org/chrony/chrony.git/?p=gitroot/chrony/chrony.git%3Ba=commit%3Bh=7864c7a70ce00369194e734eb2842ecc5f8db531 - | |
References | () http://secunia.com/advisories/38428 - Vendor Advisory | |
References | () http://secunia.com/advisories/38480 - Vendor Advisory | |
References | () http://www.debian.org/security/2010/dsa-1992 - | |
References | () http://www.securityfocus.com/bid/38106 - Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=555367 - |
Information
Published : 2010-02-08 20:30
Updated : 2024-11-21 01:11
NVD link : CVE-2010-0292
Mitre link : CVE-2010-0292
CVE.ORG link : CVE-2010-0292
JSON object : View
Products Affected
tuxfamily
- chrony
CWE
CWE-399
Resource Management Errors