|
|
Subscribe / Log in / New account

chrony: distributed denial of service via amplification

Package(s):chrony CVE #(s):CVE-2014-0021
Created:February 6, 2014 Updated:February 20, 2014
Description: From the Red Hat bugzilla entry:

Miroslav Lichvar from Red Hat reports that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification. By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address. This could allow a remote attacker to cause a DoS, which could cause excessive resource usage.

Alerts:
Fedora FEDORA-2014-1916 chrony 2014-02-20
Mageia MGASA-2014-0052 chrony 2014-02-11
Fedora FEDORA-2014-1943 chrony 2014-02-06

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds