chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://chrony.tuxfamily.org/news.html#_20_jan_2016_chrony_2_2_1_and_chrony_1_31_2_released - Vendor Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176559.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175969.html - Patch | |
References | () http://www.talosintel.com/reports/TALOS-2016-0071/ - Exploit |
Information
Published : 2016-01-26 19:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1567
Mitre link : CVE-2016-1567
CVE.ORG link : CVE-2016-1567
JSON object : View
Products Affected
tuxfamily
- chrony
CWE
CWE-254
7PK - Security Features