chronyd in Chrony before 1.23.1, and possibly 1.24-pre1, generates a syslog message for each unauthorized cmdmon packet, which allows remote attackers to cause a denial of service (disk consumption) via a large number of invalid packets.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://chrony.tuxfamily.org/News.html - Patch, Vendor Advisory | |
References | () http://git.tuxfamily.org/chrony/chrony.git/?p=gitroot/chrony/chrony.git%3Ba=commit%3Bh=0b710499f994823bd938fc6895f097eefb9cc59f - | |
References | () http://secunia.com/advisories/38428 - Vendor Advisory | |
References | () http://secunia.com/advisories/38480 - Vendor Advisory | |
References | () http://www.debian.org/security/2010/dsa-1992 - | |
References | () http://www.securityfocus.com/bid/38106 - Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=555367 - |
Information
Published : 2010-02-08 20:30
Updated : 2024-11-21 01:11
NVD link : CVE-2010-0294
Mitre link : CVE-2010-0294
CVE.ORG link : CVE-2010-0294
JSON object : View
Products Affected
tuxfamily
- chrony
CWE
CWE-399
Resource Management Errors