First published: Fri Nov 15 2019(Updated: )
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/chrony | 4.0-8+deb11u2 4.3-2+deb12u1 4.5-3 | |
Oracle Chrony | <1.29 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =19 | |
Fedora | =20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0021 has a medium severity due to potential traffic amplification attacks that can affect the cmdmon protocol in Chrony.
To fix CVE-2014-0021, upgrade Chrony to versions 1.29.1 or later.
Chrony versions prior to 1.29.1 are affected by CVE-2014-0021.
CVE-2014-0021 impacts Debian and Fedora platforms running affected versions of Chrony.
No, CVE-2014-0021 is not a remote code execution vulnerability but involves traffic amplification risks.