Executive Summary

Informations
Name CVE-2010-0292 First vendor Publication 2010-02-08
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The read_from_cmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchange of NOHOSTACCESS messages between two daemons, a related issue to CVE-2009-3563.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0292

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 17

OpenVAS Exploits

Date Description
2010-03-02 Name : Fedora Update for chrony FEDORA-2010-1536
File : nvt/gb_fedora_2010_1536_chrony_fc11.nasl
2010-03-02 Name : Fedora Update for chrony FEDORA-2010-1539
File : nvt/gb_fedora_2010_1539_chrony_fc12.nasl
2010-02-10 Name : Debian Security Advisory DSA 1992-1 (chrony)
File : nvt/deb_1992_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
62141 Chrony chronyd cmdmon Packet Handling Remote DoS

Nessus® Vulnerability Scanner

Date Description
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-1536.nasl - Type : ACT_GATHER_INFO
2010-07-01 Name : The remote Fedora host is missing a security update.
File : fedora_2010-1539.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1992.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://git.tuxfamily.org/chrony/chrony.git/?p=gitroot/chrony/chrony.git%3Ba=c...
Source Url
BID http://www.securityfocus.com/bid/38106
CONFIRM http://chrony.tuxfamily.org/News.html
https://bugzilla.redhat.com/show_bug.cgi?id=555367
DEBIAN http://www.debian.org/security/2010/dsa-1992
SECUNIA http://secunia.com/advisories/38428
http://secunia.com/advisories/38480

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2023-11-07 21:47:37
  • Multiple Updates
2021-05-05 01:06:42
  • Multiple Updates
2021-05-04 12:11:04
  • Multiple Updates
2021-04-22 01:11:35
  • Multiple Updates
2020-05-23 01:41:35
  • Multiple Updates
2020-05-23 00:25:10
  • Multiple Updates
2016-04-26 19:32:02
  • Multiple Updates
2014-02-17 10:53:33
  • Multiple Updates
2013-05-10 23:17:02
  • Multiple Updates