chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.
References
Link | Resource |
---|---|
http://chrony.tuxfamily.org/News.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/201507-01 | Third Party Advisory |
http://chrony.tuxfamily.org/News.html | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/201507-01 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://chrony.tuxfamily.org/News.html - Release Notes, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201507-01 - Third Party Advisory |
Information
Published : 2019-12-09 19:15
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1853
Mitre link : CVE-2015-1853
CVE.ORG link : CVE-2015-1853
JSON object : View
Products Affected
tuxfamily
- chrony
CWE