ALAS-2014-366

Related Vulnerabilities: CVE-2014-0021  

It was reported that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification. By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address. This could allow a remote attacker to cause a DoS, which could cause excessive resource usage.

ALAS-2014-366


Amazon Linux AMI Security Advisory: ALAS-2014-366
Advisory Release Date: 2014-07-09 16:20 Pacific
Advisory Updated Date: 2014-09-19 10:27 Pacific
Severity: Low
References: CVE-2014-0021 

Issue Overview:

It was reported that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification. By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address. This could allow a remote attacker to cause a DoS, which could cause excessive resource usage.


Affected Packages:

chrony


Issue Correction:
Run yum update chrony to update your system.

New Packages:
i686:
    chrony-1.29.1-1.8.amzn1.i686
    chrony-debuginfo-1.29.1-1.8.amzn1.i686

src:
    chrony-1.29.1-1.8.amzn1.src

x86_64:
    chrony-debuginfo-1.29.1-1.8.amzn1.x86_64
    chrony-1.29.1-1.8.amzn1.x86_64