Lucene search

K
redosRedosROS-20240704-09
HistoryJul 04, 2024 - 12:00 a.m.

ROS-20240704-09

2024-07-0400:00:00
redos.red-soft.ru
9
vulnerability
chronyd daemon
network time protocol
ntp chrony
incorrect reference
denial of service
crafted file
pid format
unix

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

AI Score

6.6

Confidence

High

Vulnerability of the chronyd daemon implementation of Network Time Protocol (NTP) Chrony
is related to incorrect reference definition before accessing a file in /var/run/chrony directory. Exploitation
the vulnerability could allow an attacker to cause a denial of service by using a specially crafted file
PID format

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64chrony< 4.0-3UNKNOWN

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

AI Score

6.6

Confidence

High