First published: Mon Dec 09 2019(Updated: )
chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Chrony | <1.31.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1853 has a high severity due to its potential to cause denial of service by interrupting NTP synchronization.
To fix CVE-2015-1853, upgrade Chrony to version 1.31.1 or later, which addresses the vulnerability.
CVE-2015-1853 affects Chrony versions prior to 1.31.1 across various operating systems that utilize NTP.
Yes, CVE-2015-1853 can be exploited remotely by attackers who can craft specific NTP data packets.
The impact of CVE-2015-1853 includes the inability to synchronize time, leading to potential disruptions in services that rely on accurate timekeeping.