Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow. NOTE: versions 1.27 and 1.28 do not require authentication to exploit.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Chrony 拒绝服务漏洞
Vulnerability Description
chrony是软件开发者Richard Curnow所研发的一套用于维护计算机系统时钟精度的工具。该工具包含chronyd(在系统后台运行的守护进程)和chronyc(用来监控chronyd性能和配置其参数的用户界面)程序。 Chrony 1.29之前的版本中的pktlength.c文件存在整数溢出漏洞。当发送REQ_SUBNETS_ACCESSED或REQ_CLIENT_ACCESSES命令请求到‘PKL_CommandLength’函数,或发送特制的(1)RPY_SUBNETS_ACCESSED,(2
CVSS Information
N/A
Vulnerability Type
N/A