Tuxfamily

Chrony

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Veröffentlicht 24.08.2020 15:15:13
  • Zuletzt bearbeitet 21.11.2024 05:03:06

A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check fo...

  • EPSS 0.92%
  • Veröffentlicht 09.12.2019 19:15:14
  • Zuletzt bearbeitet 21.11.2024 02:26:16

chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in c...

Exploit
  • EPSS 0.71%
  • Veröffentlicht 26.01.2016 19:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

  • EPSS 2.11%
  • Veröffentlicht 16.04.2015 14:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or poss...

  • EPSS 2.61%
  • Veröffentlicht 16.04.2015 14:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisibl...

  • EPSS 0.95%
  • Veröffentlicht 05.11.2013 21:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted...

  • EPSS 0.4%
  • Veröffentlicht 05.11.2013 21:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to the handle_subnets_accessed function or (2) a RPY_C...

  • EPSS 1.38%
  • Veröffentlicht 08.02.2010 20:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or ...

  • EPSS 1.38%
  • Veröffentlicht 08.02.2010 20:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

chronyd in Chrony before 1.23.1, and possibly 1.24-pre1, generates a syslog message for each unauthorized cmdmon packet, which allows remote attackers to cause a denial of service (disk consumption) via a large number of invalid packets.

  • EPSS 1.19%
  • Veröffentlicht 08.02.2010 20:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The read_from_cmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchan...