Vulnerability Description
Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tuxfamily | Chrony | <= 1.31 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msgPatchVendor Advisory
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.h
- http://www.securityfocus.com/bid/73955
- https://security.gentoo.org/glsa/201507-01
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msgPatchVendor Advisory
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.h
- http://www.securityfocus.com/bid/73955
- https://security.gentoo.org/glsa/201507-01
FAQ
What is CVE-2015-1821?
CVE-2015-1821 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) c...
How severe is CVE-2015-1821?
CVE-2015-1821 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1821?
Check the references section above for vendor advisories and patch information. Affected products include: Tuxfamily Chrony, Debian Debian Linux.