Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: Security patch for chrony (ALAS-2014-366) (CVE-2014-0021)

Back to Search

Amazon Linux AMI: Security patch for chrony (ALAS-2014-366) (CVE-2014-0021)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
09/26/2014
Created
07/25/2018
Added
09/26/2014
Modified
12/05/2019

Description

It was reported that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification. By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address. This could allow a remote attacker to cause a DoS, which could cause excessive resource usage.

Solution(s)

  • amazon-linux-upgrade-chrony
  • amazon-linux-upgrade-chrony-debuginfo

References

  • amazon-linux-upgrade-chrony
  • amazon-linux-upgrade-chrony-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;