{"id":"CVE-2010-0293","details":"The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or (2) cmdmon packets.","modified":"2026-04-10T03:41:07.583987Z","published":"2010-02-08T20:30:01Z","references":[{"type":"ADVISORY","url":"http://chrony.tuxfamily.org/News.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/38428"},{"type":"ADVISORY","url":"http://secunia.com/advisories/38480"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-1992"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=555367"},{"type":"WEB","url":"http://git.tuxfamily.org/chrony/chrony.git/?p=gitroot/chrony/chrony.git%3Ba=commit%3Bh=2f63cf448560fdb96b80d8488aae6a15b802a753"},{"type":"WEB","url":"http://www.securityfocus.com/bid/38106"}],"schema_version":"1.7.5"}