Tuxfamily

Chrony

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.26%
  • Published 24.08.2020 15:15:13
  • Last modified 21.11.2024 05:03:06

A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check fo...

  • EPSS 0.92%
  • Published 09.12.2019 19:15:14
  • Last modified 21.11.2024 02:26:16

chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in c...

Exploit
  • EPSS 0.71%
  • Published 26.01.2016 19:59:08
  • Last modified 12.04.2025 10:46:40

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

  • EPSS 2.11%
  • Published 16.04.2015 14:59:03
  • Last modified 12.04.2025 10:46:40

chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or poss...

  • EPSS 2.61%
  • Published 16.04.2015 14:59:01
  • Last modified 12.04.2025 10:46:40

Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisibl...

  • EPSS 0.95%
  • Published 05.11.2013 21:55:08
  • Last modified 11.04.2025 00:51:21

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted...

  • EPSS 0.4%
  • Published 05.11.2013 21:55:08
  • Last modified 11.04.2025 00:51:21

cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to the handle_subnets_accessed function or (2) a RPY_C...

  • EPSS 1.38%
  • Published 08.02.2010 20:30:01
  • Last modified 11.04.2025 00:51:21

The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or ...

  • EPSS 1.38%
  • Published 08.02.2010 20:30:01
  • Last modified 11.04.2025 00:51:21

chronyd in Chrony before 1.23.1, and possibly 1.24-pre1, generates a syslog message for each unauthorized cmdmon packet, which allows remote attackers to cause a denial of service (disk consumption) via a large number of invalid packets.

  • EPSS 1.19%
  • Published 08.02.2010 20:30:00
  • Last modified 11.04.2025 00:51:21

The read_from_cmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchan...