Vulnerability Details CVE-2012-4502
Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 75.3%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2012-4502
-
cpe:2.3:a:tuxfamily:chrony:1.0
-
cpe:2.3:a:tuxfamily:chrony:1.1
-
cpe:2.3:a:tuxfamily:chrony:1.18
-
cpe:2.3:a:tuxfamily:chrony:1.19
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.1
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.2
-
cpe:2.3:a:tuxfamily:chrony:1.19.99.3
-
cpe:2.3:a:tuxfamily:chrony:1.20
-
cpe:2.3:a:tuxfamily:chrony:1.21
-
cpe:2.3:a:tuxfamily:chrony:1.23
-
cpe:2.3:a:tuxfamily:chrony:1.23.1
-
cpe:2.3:a:tuxfamily:chrony:1.24
-
cpe:2.3:a:tuxfamily:chrony:1.25
-
cpe:2.3:a:tuxfamily:chrony:1.26
-
cpe:2.3:a:tuxfamily:chrony:1.27
-
cpe:2.3:a:tuxfamily:chrony:1.28