Vulnerability Description
cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to the handle_subnets_accessed function or (2) a RPY_CLIENT_ACCESSES command to the handle_client_accesses function when client logging is disabled, which causes uninitialized data to be included in a reply.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tuxfamily | Chrony | <= 1.28 |
Related Weaknesses (CWE)
References
- http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git%3Ba=commitdiff%3
- http://permalink.gmane.org/gmane.comp.time.chrony.announce/15Vendor Advisory
- http://seclists.org/oss-sec/2013/q3/332Patch
- http://www.debian.org/security/2013/dsa-2760
- https://bugzilla.redhat.com/show_bug.cgi?id=846392
- http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git%3Ba=commitdiff%3
- http://permalink.gmane.org/gmane.comp.time.chrony.announce/15Vendor Advisory
- http://seclists.org/oss-sec/2013/q3/332Patch
- http://www.debian.org/security/2013/dsa-2760
- https://bugzilla.redhat.com/show_bug.cgi?id=846392
FAQ
What is CVE-2012-4503?
CVE-2012-4503 is a vulnerability with a CVSS score of 5.0 (MEDIUM). cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to t...
How severe is CVE-2012-4503?
CVE-2012-4503 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-4503?
Check the references section above for vendor advisories and patch information. Affected products include: Tuxfamily Chrony.