Amazon Linux 1 Security Advisory: ALAS-2014-366
Advisory Release Date: 2014-07-09 16:20 Pacific
Advisory Updated Date: 2014-09-19 10:27 Pacific
It was reported that the cmdmon protocol implemented in chrony was found to be vulnerable to DDoS attacks using traffic amplification. By default, commands are allowed only from localhost, but it's possible to configure chronyd to allow commands from any address. This could allow a remote attacker to cause a DoS, which could cause excessive resource usage.
Affected Packages:
chrony
Issue Correction:
Run yum update chrony to update your system.
i686:
chrony-1.29.1-1.8.amzn1.i686
chrony-debuginfo-1.29.1-1.8.amzn1.i686
src:
chrony-1.29.1-1.8.amzn1.src
x86_64:
chrony-debuginfo-1.29.1-1.8.amzn1.x86_64
chrony-1.29.1-1.8.amzn1.x86_64