Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2016-1567

Опубликовано: 26 янв. 2016
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:tuxfamily:chrony:*:*:*:*:*:*:*:*
Версия до 1.31.1 (включая)
cpe:2.3:a:tuxfamily:chrony:2.0:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:2.1:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:tuxfamily:chrony:2.2:*:*:*:*:*:*:*

EPSS

Процентиль: 72%
0.00714
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-254

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 10 лет назад

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

redhat
около 10 лет назад

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

CVSS3: 8.1
debian
около 10 лет назад

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associati ...

CVSS3: 8.1
github
больше 3 лет назад

chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

EPSS

Процентиль: 72%
0.00714
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-254