CVE-2015-1821Improper Restriction of Operations within the Bounds of a Memory Buffer in Chrony

Severity
6.5MEDIUMNVD
EPSS
2.6%
top 14.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16
Latest updateMay 17

Description

Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 8.0 | Impact: 6.4

Affected Packages2 packages

Debiantuxfamily/chrony< 1.30-2+3

Also affects: Debian Linux 7.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-cm73-xw9w-xqmm: Heap-based buffer overflow in chrony before 12022-05-17
OSV
CVE-2015-1821: Heap-based buffer overflow in chrony before 12015-04-16
CVEList
CVE-2015-1821: Heap-based buffer overflow in chrony before 12015-04-16

📋Vendor Advisories

2
Red Hat
chrony: Heap out of bound write in address filter2015-04-07
Debian
CVE-2015-1821: chrony - Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated u...2015

💬Community

3
Bugzilla
CVE-2015-1822 CVE-2015-1821 chrony: various flaws [fedora-all]2015-04-07
Bugzilla
CVE-2015-1822 CVE-2015-1821 chrony: various flaws [epel-all]2015-04-07
Bugzilla
CVE-2015-1821 chrony: Heap out of bound write in address filter2015-04-07
CVE-2015-1821 — Tuxfamily Chrony vulnerability | cvebase