First published: Tue Aug 07 2012(Updated: )
In pktlength.c:PKL_CommandLength(), the computation in the REQ_SUBNETS_ACCESSED/REQ_CLIENT_ACCESSES cases can overflow, and PKL_CommandLength can return a negative value. As a result, the subsequent attempt to hash the packet triggers an out-of-bounds read, segmentation fault, and daemon crash. Attacks are possible from IP addresses listed in the cmdallow ACL (restricted to localhost by default) by sending UDP packets to port 323; no additional authentication is required. The length computations in pktlength.c:PKL_ReplyLength() should be guarded against overflow, too.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/chrony | <1.29 | 1.29 |
Chrony | <=1.28 | |
Chrony | =1.0 | |
Chrony | =1.1 | |
Chrony | =1.18 | |
Chrony | =1.19 | |
Chrony | =1.19.99.1 | |
Chrony | =1.19.99.2 | |
Chrony | =1.19.99.3 | |
Chrony | =1.20 | |
Chrony | =1.21 | |
Chrony | =1.21-pre1 | |
Chrony | =1.23 | |
Chrony | =1.23-pre1 | |
Chrony | =1.23.1 | |
Chrony | =1.24 | |
Chrony | =1.24-pre1 | |
Chrony | =1.25 | |
Chrony | =1.25-pre1 | |
Chrony | =1.25-pre2 | |
Chrony | =1.26 | |
Chrony | =1.26-pre1 | |
Chrony | =1.27 | |
Chrony | =1.27-pre1 | |
Chrony | =1.28-pre1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4502 is classified as a medium severity vulnerability that can lead to a daemon crash.
To mitigate CVE-2012-4502, update the Chrony package to version 1.29 or later.
CVE-2012-4502 affects multiple versions of the Chrony software, specifically versions prior to 1.29.
CVE-2012-4502 is a vulnerability that involves an overflow leading to an out-of-bounds read and segmentation fault.
Exploiting CVE-2012-4502 can result in a segmentation fault and crash of the Chrony daemon.