6.8
CVSSv2

CVE-2016-1567

Published: 26/01/2016 Updated: 06/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

chrony prior to 1.31.2 and 2.x prior to 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote malicious users to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."

Vulnerable Product Search on Vulmon Subscribe to Product

tuxfamily chrony 2.1.1

tuxfamily chrony 2.1

tuxfamily chrony 2.2

tuxfamily chrony 2.0

tuxfamily chrony

Vendor Advisories

Debian Bug report logs - #812923 chrony: CVE-2016-1567 Package: src:chrony; Maintainer for src:chrony is Vincent Blut <vincentdebian@freefr>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 27 Jan 2016 21:51:01 UTC Severity: important Tags: fixed-upstream, security, upstream Found in versions chro ...
chrony before 1312 and 2x before 221 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key" ...