Lucene search

K
archlinuxArch LinuxASA-201504-9
HistoryApr 08, 2015 - 12:00 a.m.

chrony: denial of service

2015-04-0800:00:00
Arch Linux
lists.archlinux.org
42

4.3 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:P/A:P

0.008 Low

EPSS

Percentile

79.1%

CVE-2015-1853 (denial of service):
This issue is similiar to the "ntp CVE-2015-1799"-issue.
An attacker knowing that NTP hosts A and B are peering with each other
(symmetric association) can send a packet to host A with source address of B
which will set the NTP state variables on A to the values sent by the attacker.
Host A will then send on its next poll to B a packet with originate timestamp
that doesn’t match the transmit timestamp of B and the packet will be dropped.
If the attacker does this periodically for both hosts, they won’t be able to
synchronize to each other. This is a known denial-of-service attack

OSVersionArchitecturePackageVersionFilename
anyanyanychrony< 1.31.1-1UNKNOWN

4.3 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:M/Au:N/C:N/I:P/A:P

0.008 Low

EPSS

Percentile

79.1%