CVE-2012-4502

Priority
Description
Multiple integer overflows in pktlength.c in Chrony before 1.29 allow
remote attackers to cause a denial of service (crash) via a crafted (1)
REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the
PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4)
RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6)
RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which
triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and
1.28 do not require authentication to exploit.
Notes
Package
Upstream:released (1.29)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (1.29-1)
Ubuntu 20.04 FIPS Compliant (Focal Fossa):not-affected
Patches:
More Information

Updated: 2022-02-11 00:15:55 UTC (commit acb3d89ab51f1d5e5543fa993969c0eb13c71f04)