First published: Thu Jan 14 2010(Updated: )
Description of problem: This is similar to NTP security flaw <a href="https://access.redhat.com/security/cve/CVE-2009-3563">CVE-2009-3563</a>. chronyd replies to all cmdmon packets from unauthorized hosts with NOHOSTACCESS message. This can be used to create a loop between two chrony daemons which don't allow cmdmon access from each other by sending a packet with spoofed source address and port. This will cause high CPU, network and syslog usage. The applies to all chrony versions including 1.24-pre1.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/1.23 | <8.20081106 | 8.20081106 |
Chrony | =1.19 | |
Chrony | =1.20 | |
Chrony | <=1.23-pre1 | |
Chrony | =1.19.99.3 | |
Chrony | =1.19-1 | |
Chrony | =1.19.99.2 | |
Chrony | =1.21-pre1 | |
Chrony | =1.18 | |
Chrony | =1.24-pre1 | |
Chrony | =1.19.99.1 | |
Chrony | =1.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0292 is considered a moderate severity vulnerability affecting certain versions of the chrony daemon.
To fix CVE-2010-0292, update chrony to version 1.23 or later.
CVE-2010-0292 affects chrony versions prior to 1.23 including 1.18, 1.19, 1.21, and 1.24-pre1.
Yes, CVE-2010-0292 can create loops between chrony daemons, potentially disrupting NTP service.
CVE-2010-0292 is conceptually similar to CVE-2009-3563 which also involves unauthorized packet handling.