Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-4502

Опубликовано: 05 нояб. 2013
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:tuxfamily:chrony:*:*:*:*:*:*:*:*
Версия до 1.28 (включая)
cpe:2.3:a:tuxfamily:chrony:1.0:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.1:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.18:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.19:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.19.99.1:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.19.99.2:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.19.99.3:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.20:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.21:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.21:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.23:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.23:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.23.1:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.24:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.24:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.25:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.25:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.25:pre2:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.26:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.26:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.27:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.27:pre1:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:1.28:pre1:*:*:*:*:*:*

EPSS

Процентиль: 74%
0.00838
Низкий

5 Medium

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
больше 12 лет назад

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.

redhat
больше 12 лет назад

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.

debian
больше 12 лет назад

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow ...

github
больше 3 лет назад

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.

EPSS

Процентиль: 74%
0.00838
Низкий

5 Medium

CVSS2

Дефекты

CWE-189