First published: Tue Nov 05 2013(Updated: )
cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to the handle_subnets_accessed function or (2) a RPY_CLIENT_ACCESSES command to the handle_client_accesses function when client logging is disabled, which causes uninitialized data to be included in a reply.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Chrony | <=1.28 | |
Chrony | =1.0 | |
Chrony | =1.1 | |
Chrony | =1.18 | |
Chrony | =1.19 | |
Chrony | =1.19.99.1 | |
Chrony | =1.19.99.2 | |
Chrony | =1.19.99.3 | |
Chrony | =1.20 | |
Chrony | =1.21 | |
Chrony | =1.21-pre1 | |
Chrony | =1.23 | |
Chrony | =1.23-pre1 | |
Chrony | =1.23.1 | |
Chrony | =1.24 | |
Chrony | =1.24-pre1 | |
Chrony | =1.25 | |
Chrony | =1.25-pre1 | |
Chrony | =1.25-pre2 | |
Chrony | =1.26 | |
Chrony | =1.26-pre1 | |
Chrony | =1.27 | |
Chrony | =1.27-pre1 | |
Chrony | =1.28-pre1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4503 is classified as a medium-severity vulnerability.
CVE-2012-4503 allows remote attackers to obtain potentially sensitive information from stack memory.
To mitigate CVE-2012-4503, upgrade Chrony to version 1.29 or later.
Chrony versions before 1.29, including 1.28 and earlier, are affected by CVE-2012-4503.
CVE-2012-4503 involves the RPY_SUBNETS_ACCESSED and RPY_CLIENT_ACCESSES commands.