5
CVSSv2

CVE-2014-0021

Published: 15/11/2019 Updated: 18/08/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Chrony prior to 1.29.1 has traffic amplification in cmdmon protocol

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

chrony project chrony

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 19

fedoraproject fedora 20

Vendor Advisories

Debian Bug report logs - #737644 chrony: CVE-2014-0021: traffic amplification in cmdmon protocol Package: chrony; Maintainer for chrony is Vincent Blut <vincentdebian@freefr>; Source for chrony is src:chrony (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 4 Feb 2014 16:12:01 ...
It was reported that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address This could allow a remote attacker to cause a DoS, which could cause excessive resourc ...