CVE-2012-4502

Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow.  NOTE: versions 1.27 and 1.28 do not require authentication to exploit.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 75%
VendorProductVersion
tuxfamilychrony
𝑥
≤ 1.28
tuxfamilychrony
1.0
tuxfamilychrony
1.1
tuxfamilychrony
1.18
tuxfamilychrony
1.19
tuxfamilychrony
1.19.99.1
tuxfamilychrony
1.19.99.2
tuxfamilychrony
1.19.99.3
tuxfamilychrony
1.20
tuxfamilychrony
1.21
tuxfamilychrony
1.21:pre1
tuxfamilychrony
1.23
tuxfamilychrony
1.23:pre1
tuxfamilychrony
1.23.1
tuxfamilychrony
1.24
tuxfamilychrony
1.24:pre1
tuxfamilychrony
1.25
tuxfamilychrony
1.25:pre1
tuxfamilychrony
1.25:pre2
tuxfamilychrony
1.26
tuxfamilychrony
1.26:pre1
tuxfamilychrony
1.27
tuxfamilychrony
1.27:pre1
tuxfamilychrony
1.28:pre1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
chrony
bullseye
4.0-8+deb11u2
fixed
bookworm
4.3-2+deb12u1
fixed
sid
4.6.1-1
fixed
trixie
4.6.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
chrony
artful
not-affected
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
not-affected
saucy
ignored
raring
ignored
quantal
ignored
precise
ignored
lucid
ignored
Common Weakness Enumeration