CVE-2010-0292

NameCVE-2010-0292
DescriptionThe read_from_cmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchange of NOHOSTACCESS messages between two daemons, a related issue to CVE-2009-3563.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-1992-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
chrony (PTS)wheezy1.24-3.1+deb7u3fixed
wheezy (security)1.24-3.1+deb7u4fixed
jessie1.30-2+deb8u2fixed
stretch3.0-4+deb9u1fixed
buster, sid3.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
chronysource(unstable)1.23-7medium
chronysourceetch1.21z-5+etch1mediumDSA-1992-1
chronysourcelenny1.23-6+lenny1mediumDSA-1992-1

Search for package or bug name: Reporting problems