Vulnerabilites related to avahi - avahi
Vulnerability from fkie_nvd
Published
2006-12-31 05:00
Modified
2024-11-21 00:23
Severity ?
Summary
The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
References
security@ubuntu.comhttp://fedoranews.org/cms/node/2362
security@ubuntu.comhttp://fedoranews.org/cms/node/2408
security@ubuntu.comhttp://secunia.com/advisories/23628
security@ubuntu.comhttp://secunia.com/advisories/23644
security@ubuntu.comhttp://secunia.com/advisories/23660
security@ubuntu.comhttp://secunia.com/advisories/23673
security@ubuntu.comhttp://secunia.com/advisories/23782
security@ubuntu.comhttp://secunia.com/advisories/24995
security@ubuntu.comhttp://www.avahi.org/#December2006Patch
security@ubuntu.comhttp://www.avahi.org/changeset/1340
security@ubuntu.comhttp://www.avahi.org/ticket/84Patch
security@ubuntu.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:003
security@ubuntu.comhttp://www.novell.com/linux/security/advisories/2007_007_suse.html
security@ubuntu.comhttp://www.securityfocus.com/bid/21881
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-402-1
security@ubuntu.comhttp://www.vupen.com/english/advisories/2007/0071
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2362
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2408
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23628
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23644
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23660
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23673
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23782
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24995
af854a3a-2127-422b-91ae-364da2661108http://www.avahi.org/#December2006Patch
af854a3a-2127-422b-91ae-364da2661108http://www.avahi.org/changeset/1340
af854a3a-2127-422b-91ae-364da2661108http://www.avahi.org/ticket/84Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:003
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_007_suse.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21881
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-402-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0071
Impacted products
Vendor Product Version
avahi avahi 0.6.7
avahi avahi 0.6.8
avahi avahi 0.6.9
avahi avahi 0.6.10
avahi avahi 0.6.11
avahi avahi 0.6.12
avahi avahi 0.6.13
avahi avahi 0.6.14
avahi avahi 0.6.15



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C0D4625-24B2-4BF7-B32B-7BCC12C8BD1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8266D64B-B067-413E-BDA7-4AB770D4F570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99BF964-2FC8-45B5-AD69-4790179B8AF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA79F96-1C98-49BE-8197-D52B8B6DEF24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FF6E882-B66D-4B84-AFE7-D96B1B43E65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5A8266-1859-45EB-9F16-BF0A5DE1A651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC2000C5-238B-43EF-B374-E7505CC61B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC2B1B-C800-410D-8484-569675FFD484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD6F264D-6E78-4E57-96F7-C8B86BDFBD95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.",
      },
      {
         lang: "es",
         value: "La función consume_labels en avahi-core/dns.c en Avahi before 0.6.16 permite a un atacante remoto provocar denegación de servicio (bucle infinito) a través de respuestas DNS comprimidas manipuladas con una etiqueta que apunta así misma.",
      },
   ],
   evaluatorSolution: "This vulnerability is addressed in the following product release:\r\nAvahi, Avahi, 0.6.16",
   id: "CVE-2006-6870",
   lastModified: "2024-11-21T00:23:50.903",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-12-31T05:00:00.000",
   references: [
      {
         source: "security@ubuntu.com",
         url: "http://fedoranews.org/cms/node/2362",
      },
      {
         source: "security@ubuntu.com",
         url: "http://fedoranews.org/cms/node/2408",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/23628",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/23644",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/23660",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/23673",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/23782",
      },
      {
         source: "security@ubuntu.com",
         url: "http://secunia.com/advisories/24995",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
         ],
         url: "http://www.avahi.org/#December2006",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.avahi.org/changeset/1340",
      },
      {
         source: "security@ubuntu.com",
         tags: [
            "Patch",
         ],
         url: "http://www.avahi.org/ticket/84",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:003",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.novell.com/linux/security/advisories/2007_007_suse.html",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.securityfocus.com/bid/21881",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.ubuntu.com/usn/usn-402-1",
      },
      {
         source: "security@ubuntu.com",
         url: "http://www.vupen.com/english/advisories/2007/0071",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/cms/node/2362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://fedoranews.org/cms/node/2408",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23628",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23644",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23660",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23673",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23782",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/24995",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.avahi.org/#December2006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.avahi.org/changeset/1340",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.avahi.org/ticket/84",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_007_suse.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/21881",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-402-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/0071",
      },
   ],
   sourceIdentifier: "security@ubuntu.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-11-14 22:07
Modified
2024-11-21 00:19
Severity ?
Summary
Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
References
secalert@redhat.comhttp://avahi.org/milestone/Avahi%200.6.15
secalert@redhat.comhttp://secunia.com/advisories/22807Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22852Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/22932
secalert@redhat.comhttp://secunia.com/advisories/23020
secalert@redhat.comhttp://secunia.com/advisories/23042
secalert@redhat.comhttp://securitytracker.com/id?1017257
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200611-13.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:215
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_26_sr.html
secalert@redhat.comhttp://www.securityfocus.com/bid/21016
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/4474
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/30207
secalert@redhat.comhttps://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html
secalert@redhat.comhttps://usn.ubuntu.com/380-1/
af854a3a-2127-422b-91ae-364da2661108http://avahi.org/milestone/Avahi%200.6.15
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22807Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22852Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22932
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23020
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23042
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017257
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:215
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_26_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21016
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4474
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30207
af854a3a-2127-422b-91ae-364da2661108https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/380-1/
Impacted products
Vendor Product Version
avahi avahi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "24BA0FDC-4017-43B5-8CE7-980C1A1F1033",
                     versionEndIncluding: "0.6.14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.",
      },
      {
         lang: "es",
         value: "Avahi anterior a 0.6.15 no verifica la identidad del remitente de mensajes netlink para asegurar que provienen del núcleo en lugar que de otro proceso, lo cual permite a usuarios locales suplantar cambios de red en Avahi.",
      },
   ],
   id: "CVE-2006-5461",
   lastModified: "2024-11-21T00:19:20.127",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-11-14T22:07:00.000",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://avahi.org/milestone/Avahi%200.6.15",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22807",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22852",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/22932",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23020",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/23042",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1017257",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/21016",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.vupen.com/english/advisories/2006/4474",
      },
      {
         source: "secalert@redhat.com",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207",
      },
      {
         source: "secalert@redhat.com",
         url: "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html",
      },
      {
         source: "secalert@redhat.com",
         url: "https://usn.ubuntu.com/380-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://avahi.org/milestone/Avahi%200.6.15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22807",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/22852",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/22932",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23020",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/23042",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1017257",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/21016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/4474",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://usn.ubuntu.com/380-1/",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 15:15
Modified
2024-11-21 08:13
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Impacted products
Vendor Product Version
avahi avahi *
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6481267F-934F-4A0C-9B25-59738E798458",
                     versionEndExcluding: "0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función dbus_set_host_name.",
      },
   ],
   id: "CVE-2023-38471",
   lastModified: "2024-11-21T08:13:38.837",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T15:15:08.300",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38471",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191691",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38471",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191691",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-07 12:15
Modified
2024-11-21 06:21
Summary
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Impacted products
Vendor Product Version
avahi avahi 0.8-5



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.8-5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EAEC835-CEC0-4E0E-8D58-0455FC7EA42B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.",
      },
      {
         lang: "es",
         value: "Se encontró un fallo en avahi versión 0.8-5. Una aserción alcanzable está presente en la función avahi_s_host_name_resolver_start que permite a un atacante local bloquear el servicio avahi requiriendo resoluciones de nombre de host a través del socket avahi o métodos dbus para nombres de host no válidos. La mayor amenaza de esta vulnerabilidad es la disponibilidad del servicio",
      },
   ],
   id: "CVE-2021-3502",
   lastModified: "2024-11-21T06:21:41.840",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-05-07T12:15:07.267",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/338",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/338",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-06-22 21:30
Modified
2024-11-21 00:33
Severity ?
Summary
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
References
cve@mitre.orghttp://avahi.org/changeset/1482
cve@mitre.orghttp://avahi.org/milestone/Avahi%200.6.20Patch
cve@mitre.orghttp://osvdb.org/37507
cve@mitre.orghttp://secunia.com/advisories/25811
cve@mitre.orghttp://secunia.com/advisories/26083
cve@mitre.orghttp://secunia.com/advisories/26791
cve@mitre.orghttp://secunia.com/advisories/33220
cve@mitre.orghttp://secunia.com/advisories/33279
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1690
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:185
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_14_sr.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/472443/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24614
cve@mitre.orghttp://www.securitytracker.com/id?1018706
cve@mitre.orghttp://www.ubuntu.com/usn/usn-696-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2317
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/35036
af854a3a-2127-422b-91ae-364da2661108http://avahi.org/changeset/1482
af854a3a-2127-422b-91ae-364da2661108http://avahi.org/milestone/Avahi%200.6.20Patch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/37507
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25811
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26083
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26791
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33220
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33279
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1690
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:185
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_14_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/472443/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24614
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018706
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-696-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2317
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35036
Impacted products
Vendor Product Version
avahi avahi *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE495EF2-BD8E-4C73-A952-27B7C397858F",
                     versionEndIncluding: "0.6.19",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.",
      },
      {
         lang: "es",
         value: "El demonio Avahi en Avahi versiones anteriores   a 0.6.20 permite a atacantes provocar una denegación de servicio (salida) mediante datos TXT vacíos a través de D-Bus, que dispara un error de aserción.",
      },
   ],
   id: "CVE-2007-3372",
   lastModified: "2024-11-21T00:33:04.593",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-06-22T21:30:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://avahi.org/changeset/1482",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://avahi.org/milestone/Avahi%200.6.20",
      },
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/37507",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/25811",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/26083",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/26791",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/33220",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/33279",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2008/dsa-1690",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2007_14_sr.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/472443/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/24614",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1018706",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.ubuntu.com/usn/usn-696-1",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2007/2317",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/35036",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://avahi.org/changeset/1482",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://avahi.org/milestone/Avahi%200.6.20",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/37507",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/25811",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26083",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26791",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33279",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1690",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2007_14_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/472443/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/24614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1018706",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-696-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/2317",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/35036",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "Not vulnerable. This issue did not affect the versions of avahi as shipped with Red Hat Enterprise Linux 5.",
         lastModified: "2009-01-08T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-02-17 22:15
Modified
2024-11-21 05:56
Summary
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
References
cve@mitre.orghttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796Mailing List, Third Party Advisory
cve@mitre.orghttps://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824Issue Tracking, Third Party Advisory
cve@mitre.orghttps://bugzilla.suse.com/show_bug.cgi?id=1180827Issue Tracking, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2022/06/msg00009.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelogBroken Link, Third Party Advisory
cve@mitre.orghttps://packages.debian.org/bullseye/avahi-daemonProduct, Third Party Advisory
cve@mitre.orghttps://packages.debian.org/buster/avahi-daemonProduct, Third Party Advisory
cve@mitre.orghttps://packages.debian.org/sid/avahi-daemonProduct, Third Party Advisory
cve@mitre.orghttps://security-tracker.debian.org/tracker/CVE-2021-26720Third Party Advisory
cve@mitre.orghttps://www.openwall.com/lists/oss-security/2021/02/15/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.suse.com/show_bug.cgi?id=1180827Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/06/msg00009.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelogBroken Link, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://packages.debian.org/bullseye/avahi-daemonProduct, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://packages.debian.org/buster/avahi-daemonProduct, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://packages.debian.org/sid/avahi-daemonProduct, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security-tracker.debian.org/tracker/CVE-2021-26720Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.openwall.com/lists/oss-security/2021/02/15/2Mailing List, Third Party Advisory
Impacted products
Vendor Product Version
avahi avahi *
debian debian_linux 9.0
debian debian_linux 10.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7960274F-0D6F-4054-8236-145A6430B6CE",
                     versionEndIncluding: "0.8-4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.",
      },
      {
         lang: "es",
         value: "El archivo avahi-daemon-check-dns.sh en el paquete Debian avahi a versiones hasta 0.8-4, es ejecutado como root por medio de /etc/network/if-up.d/avahi-daemon, y permite a un atacante local causar una denegación de servicio o crear archivos vacíos arbitrarios por medio de un ataque de tipo symlink en archivos bajo /run/avahi-daemon. NOTA: esto solo afecta al empaquetado de Debian GNU/Linux (usado indirectamente por SUSE), no al producto de Avahi previo",
      },
   ],
   id: "CVE-2021-26720",
   lastModified: "2024-11-21T05:56:44.693",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-02-17T22:15:12.710",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
         ],
         url: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/bullseye/avahi-daemon",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/buster/avahi-daemon",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/sid/avahi-daemon",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
         ],
         url: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/bullseye/avahi-daemon",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/buster/avahi-daemon",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Third Party Advisory",
         ],
         url: "https://packages.debian.org/sid/avahi-daemon",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-59",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2010-07-08 12:54
Modified
2024-11-21 01:16
Severity ?
Summary
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
Impacted products
Vendor Product Version
avahi avahi 0.6.16
avahi avahi 0.6.25



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A18985C-8EBB-43A0-BCFC-5CF08DF9D3A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCABA66C-DFA0-4760-9176-F2D693381620",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.",
      },
      {
         lang: "es",
         value: "La función AvahiDnsPacket en avahi-core/socket.c en avahi-daemon en Avahi v0.6.16 y v0.6.25 permite a atacantes remotos provocar una denegación de servicio (error de aserción y cuelgue del demonio) a través de un paquete DNS con una suma de comprobación no válida seguido por un paquete DNS con una suma de comprobación válida, una vulnerabilidad diferente de CVE-2008-5081.",
      },
   ],
   id: "CVE-2010-2244",
   lastModified: "2024-11-21T01:16:13.623",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2010-07-08T12:54:47.083",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://marc.info/?l=oss-security&m=127748459505200&w=2",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2010/dsa-2086",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2010/06/23/4",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securitytracker.com/id?1024200",
      },
      {
         source: "secalert@redhat.com",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=oss-security&m=127748459505200&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2010/dsa-2086",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2010/06/23/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1024200",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-06-02 16:15
Modified
2024-11-21 06:21
Summary
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Impacted products
Vendor Product Version
avahi avahi *
debian debian_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A5E35AD-158F-4E70-8C3A-3E27BF3406F4",
                     versionEndIncluding: "0.8",
                     versionStartIncluding: "0.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.",
      },
      {
         lang: "es",
         value: "Se ha encontrado un fallo en avahi en versiones 0.6 hasta 0.8. El evento usado para señalar la terminación de la conexión del cliente en el socket Unix de avahi no se maneja correctamente en la función client_work, permitiendo a un atacante local desencadenar un bucle infinito. La mayor amenaza de esta vulnerabilidad es la disponibilidad del servicio avahi, que deja de responder después de que este fallo es activado",
      },
   ],
   id: "CVE-2021-3468",
   lastModified: "2024-11-21T06:21:36.953",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-06-02T16:15:08.960",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1939614",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.debian.org/debian-lts-announce/2023/06/msg00028.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1939614",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.debian.org/debian-lts-announce/2023/06/msg00028.html",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2011-02-22 19:00
Modified
2024-11-21 01:25
Severity ?
Summary
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
References
secalert@redhat.comhttp://avahi.org/ticket/325Broken Link
secalert@redhat.comhttp://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6Broken Link
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlThird Party Advisory
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/18/1Mailing List, Third Party Advisory
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/18/4Mailing List, Third Party Advisory
secalert@redhat.comhttp://osvdb.org/70948Broken Link
secalert@redhat.comhttp://secunia.com/advisories/43361Broken Link, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43465Broken Link
secalert@redhat.comhttp://secunia.com/advisories/43605Broken Link
secalert@redhat.comhttp://secunia.com/advisories/43673Broken Link
secalert@redhat.comhttp://secunia.com/advisories/44131Broken Link
secalert@redhat.comhttp://ubuntu.com/usn/usn-1084-1Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2174Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:037Broken Link
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:040Broken Link
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/02/22/9Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0436.htmlBroken Link
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0779.htmlBroken Link
secalert@redhat.comhttp://www.securityfocus.com/bid/46446Broken Link, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0448Broken Link, Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0499Broken Link, Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0511Broken Link
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0565Broken Link
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0601Broken Link
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0670Broken Link
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0969Broken Link
secalert@redhat.comhttp://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/Exploit, Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=667187Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65524Not Applicable
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65525Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://avahi.org/ticket/325Broken Link
af854a3a-2127-422b-91ae-364da2661108http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/18/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/18/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/70948Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43361Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43465Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43605Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43673Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44131Broken Link
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1084-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2174Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:037Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:040Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/02/22/9Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0436.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0779.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46446Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0448Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0499Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0511Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0565Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0601Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0670Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0969Broken Link
af854a3a-2127-422b-91ae-364da2661108http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=667187Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65524Not Applicable
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65525Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
avahi avahi *
avahi avahi 0.1
avahi avahi 0.2
avahi avahi 0.3
avahi avahi 0.4
avahi avahi 0.5
avahi avahi 0.5.1
avahi avahi 0.5.2
avahi avahi 0.6.1
avahi avahi 0.6.2
avahi avahi 0.6.3
avahi avahi 0.6.4
avahi avahi 0.6.5
avahi avahi 0.6.6
avahi avahi 0.6.7
avahi avahi 0.6.8
avahi avahi 0.6.9
avahi avahi 0.6.10
avahi avahi 0.6.11
avahi avahi 0.6.12
avahi avahi 0.6.13
avahi avahi 0.6.14
avahi avahi 0.6.15
avahi avahi 0.6.16
avahi avahi 0.6.17
avahi avahi 0.6.18
avahi avahi 0.6.19
avahi avahi 0.6.20
avahi avahi 0.6.21
avahi avahi 0.6.22
avahi avahi 0.6.23
avahi avahi 0.6.24
avahi avahi 0.6.25
avahi avahi 0.6.26
avahi avahi 0.6.27
fedoraproject fedora 15
redhat enterprise_linux 5.0
redhat enterprise_linux 6.0
canonical ubuntu_linux 8.04
canonical ubuntu_linux 9.10
canonical ubuntu_linux 10.04
canonical ubuntu_linux 10.10
debian debian_linux 5.0
debian debian_linux 6.0
debian debian_linux 7.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "95B53C03-9556-4464-96C9-BF5B0CA9C88B",
                     versionEndIncluding: "0.6.28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB4B0D9D-FEBD-4C27-8208-CCB5BA5975AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA69351E-9DB3-4F0E-AE4D-C5448BD0D99B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "236CE850-B281-428F-8E2D-E0CC649C79FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C1BDC60-035E-4F42-8FE2-1B1E22DC64B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC11CFE6-B57C-484C-8F10-9F68FED7B467",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC276CA-DC35-4955-82C6-EC0059970195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D330EA3-8EB9-4498-B6AD-787FF14ACE39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF748-AF75-46B3-BCF7-5E51FE51AB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D210D68-75A5-4518-B012-23474DA04E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8A5591-6D72-4E74-A187-936A900CB1F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B839D606-3383-4887-862A-3E72F134352F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78AC30C-D5F7-4142-B4F2-1132BF0D1000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FBA6408-1181-44DA-9C75-734AD745780C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C0D4625-24B2-4BF7-B32B-7BCC12C8BD1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8266D64B-B067-413E-BDA7-4AB770D4F570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99BF964-2FC8-45B5-AD69-4790179B8AF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA79F96-1C98-49BE-8197-D52B8B6DEF24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FF6E882-B66D-4B84-AFE7-D96B1B43E65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5A8266-1859-45EB-9F16-BF0A5DE1A651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC2000C5-238B-43EF-B374-E7505CC61B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC2B1B-C800-410D-8484-569675FFD484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD6F264D-6E78-4E57-96F7-C8B86BDFBD95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A18985C-8EBB-43A0-BCFC-5CF08DF9D3A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "26E4AECD-B872-46D5-AAA0-280CC32E2F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "563F6941-3A7E-4C44-BAC8-C19BDED9BDF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "12B07E9A-345B-4E14-9D0D-5CAB84761D93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A187641-2E8C-4B40-B861-E49294F3E39F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6FE243E-6E65-4726-832D-0585FE31A182",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "735FEE37-3948-46DD-A56F-42078EF31345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "9658080D-9785-4FB2-90A5-46F5A42923EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6EBAEB0-523C-4722-9E22-6A607641F919",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCABA66C-DFA0-4760-9176-F2D693381620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE1D288C-8288-4BA8-A2C4-829A5891EF3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "18AA4A79-C9C6-4D39-978E-0F55152AAC53",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "9396E005-22D8-4342-9323-C7DEA379191D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "87614B58-24AB-49FB-9C84-E8DDBA16353B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C757774-08E7-40AA-B532-6F705C8F7639",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "036E8A89-7A16-411F-9D31-676313BB7244",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.",
      },
      {
         lang: "es",
         value: "avahi-core/socket.c en avahi-daemon en Avahi antes de v0.6.29 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de un paquete UDP (1) IPv4 o (2) IPv6 vacíos al puerto 5353. NOTA: esta vulnerabilidad existe debido a una corrección incorrecta del CVE-2010-2244.",
      },
   ],
   id: "CVE-2011-1002",
   lastModified: "2024-11-21T01:25:18.263",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2011-02-22T19:00:02.503",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://avahi.org/ticket/325",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/18/1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/18/4",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/70948",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/43361",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43465",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43605",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43673",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/44131",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-1084-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2011/dsa-2174",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/02/22/9",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0436.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0779.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/46446",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0448",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0499",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0511",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0565",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0601",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0670",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0969",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://avahi.org/ticket/325",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/18/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://openwall.com/lists/oss-security/2011/02/18/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/70948",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/43361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43465",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43605",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/43673",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://secunia.com/advisories/44131",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://ubuntu.com/usn/usn-1084-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2011/dsa-2174",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2011/02/22/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0436.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0779.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/46446",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0448",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0499",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0565",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0601",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0670",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0969",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-835",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 15:15
Modified
2024-11-21 08:13
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Impacted products
Vendor Product Version
avahi avahi *
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6481267F-934F-4A0C-9B25-59738E798458",
                     versionEndExcluding: "0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_escape_label().",
      },
   ],
   id: "CVE-2023-38470",
   lastModified: "2024-11-21T08:13:38.703",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T15:15:08.237",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38470",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191690",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38470",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191690",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-12-17 02:30
Modified
2024-11-21 00:53
Severity ?
Summary
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
References
secalert@redhat.comhttp://avahi.org/milestone/Avahi%200.6.24
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
secalert@redhat.comhttp://secunia.com/advisories/33153
secalert@redhat.comhttp://secunia.com/advisories/33220
secalert@redhat.comhttp://secunia.com/advisories/33279
secalert@redhat.comhttp://secunia.com/advisories/33475
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200901-11.xml
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1690
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2008/12/14/1
secalert@redhat.comhttp://www.securityfocus.com/bid/32825
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-696-1
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987
secalert@redhat.comhttps://www.exploit-db.com/exploits/7520
af854a3a-2127-422b-91ae-364da2661108http://avahi.org/milestone/Avahi%200.6.24
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33153
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33220
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33279
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33475
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200901-11.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1690
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/12/14/1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32825
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-696-1
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/7520
Impacted products
Vendor Product Version
avahi avahi *
avahi avahi 0.1
avahi avahi 0.2
avahi avahi 0.3
avahi avahi 0.4
avahi avahi 0.5
avahi avahi 0.5.1
avahi avahi 0.5.2
avahi avahi 0.6.1
avahi avahi 0.6.2
avahi avahi 0.6.3
avahi avahi 0.6.4
avahi avahi 0.6.5
avahi avahi 0.6.6
avahi avahi 0.6.7
avahi avahi 0.6.8
avahi avahi 0.6.9
avahi avahi 0.6.10
avahi avahi 0.6.11
avahi avahi 0.6.12
avahi avahi 0.6.13
avahi avahi 0.6.14
avahi avahi 0.6.15
avahi avahi 0.6.16
avahi avahi 0.6.17
avahi avahi 0.6.18
avahi avahi 0.6.19
avahi avahi 0.6.20
avahi avahi 0.6.21
avahi avahi 0.6.22



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1E36434-D6E7-409A-BB41-CA9F6A9E9B31",
                     versionEndIncluding: "0.6.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB4B0D9D-FEBD-4C27-8208-CCB5BA5975AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA69351E-9DB3-4F0E-AE4D-C5448BD0D99B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "236CE850-B281-428F-8E2D-E0CC649C79FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C1BDC60-035E-4F42-8FE2-1B1E22DC64B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC11CFE6-B57C-484C-8F10-9F68FED7B467",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC276CA-DC35-4955-82C6-EC0059970195",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D330EA3-8EB9-4498-B6AD-787FF14ACE39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AACF748-AF75-46B3-BCF7-5E51FE51AB5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D210D68-75A5-4518-B012-23474DA04E04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB8A5591-6D72-4E74-A187-936A900CB1F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B839D606-3383-4887-862A-3E72F134352F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D78AC30C-D5F7-4142-B4F2-1132BF0D1000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FBA6408-1181-44DA-9C75-734AD745780C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C0D4625-24B2-4BF7-B32B-7BCC12C8BD1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8266D64B-B067-413E-BDA7-4AB770D4F570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99BF964-2FC8-45B5-AD69-4790179B8AF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA79F96-1C98-49BE-8197-D52B8B6DEF24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FF6E882-B66D-4B84-AFE7-D96B1B43E65D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC5A8266-1859-45EB-9F16-BF0A5DE1A651",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC2000C5-238B-43EF-B374-E7505CC61B29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BAC2B1B-C800-410D-8484-569675FFD484",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD6F264D-6E78-4E57-96F7-C8B86BDFBD95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A18985C-8EBB-43A0-BCFC-5CF08DF9D3A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "26E4AECD-B872-46D5-AAA0-280CC32E2F64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "563F6941-3A7E-4C44-BAC8-C19BDED9BDF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "12B07E9A-345B-4E14-9D0D-5CAB84761D93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A187641-2E8C-4B40-B861-E49294F3E39F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6FE243E-6E65-4726-832D-0585FE31A182",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "735FEE37-3948-46DD-A56F-42078EF31345",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.",
      },
      {
         lang: "es",
         value: "La función originates_from_local_legacy_unicast_socket (avahi-core/server.c)en avahi-daemon en Avahi anterior a v0.6.24 permite a atacantes remotos producir una denegación de servicio (caída) a través de un paquete mDNS manipulado con un puerto de origen de 0, que dispara un fallo de evaluación.",
      },
   ],
   id: "CVE-2008-5081",
   lastModified: "2024-11-21T00:53:14.717",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-12-17T02:30:00.187",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://avahi.org/milestone/Avahi%200.6.24",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33153",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33220",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33279",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/33475",
      },
      {
         source: "secalert@redhat.com",
         url: "http://security.gentoo.org/glsa/glsa-200901-11.xml",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2008/dsa-1690",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2008/12/14/1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.securityfocus.com/bid/32825",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.ubuntu.com/usn/usn-696-1",
      },
      {
         source: "secalert@redhat.com",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.exploit-db.com/exploits/7520",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://avahi.org/milestone/Avahi%200.6.24",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33153",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33279",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/33475",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200901-11.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2008/dsa-1690",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2008/12/14/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/32825",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-696-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.exploit-db.com/exploits/7520",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-26 18:15
Modified
2025-01-15 22:15
Summary
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.7-20:*:*:*:*:*:*:*",
                     matchCriteriaId: "957FE29F-E745-4BEB-B107-17C4AF0B5AE7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                     matchCriteriaId: "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.",
      },
   ],
   id: "CVE-2023-1981",
   lastModified: "2025-01-15T22:15:25.813",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-05-26T18:15:11.277",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-1981",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2185911",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-1981",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2185911",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/375",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-400",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 16:15
Modified
2024-11-21 08:13
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Impacted products
Vendor Product Version
avahi avahi *
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6481267F-934F-4A0C-9B25-59738E798458",
                     versionEndExcluding: "0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_alternative_host_name().",
      },
   ],
   id: "CVE-2023-38473",
   lastModified: "2024-11-21T08:13:39.107",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T16:15:08.773",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38473",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191694",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38473",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191694",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 15:15
Modified
2024-11-21 08:13
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Impacted products
Vendor Product Version
avahi avahi *
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6481267F-934F-4A0C-9B25-59738E798458",
                     versionEndExcluding: "0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_rdata_parse().",
      },
   ],
   id: "CVE-2023-38472",
   lastModified: "2024-11-21T08:13:38.970",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T15:15:08.363",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38472",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191692",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38472",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191692",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-02 15:15
Modified
2024-11-21 08:13
Summary
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Impacted products
Vendor Product Version
avahi avahi *
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6481267F-934F-4A0C-9B25-59738E798458",
                     versionEndExcluding: "0.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.",
      },
      {
         lang: "es",
         value: "Se encontró una vulnerabilidad en Avahi, donde existe una afirmación alcanzable en avahi_dns_packet_append_record.",
      },
   ],
   id: "CVE-2023-38469",
   lastModified: "2024-11-21T08:13:38.563",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "secalert@redhat.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-02T15:15:08.167",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38469",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191687",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/security/cve/CVE-2023-38469",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191687",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "secalert@redhat.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-617",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-05-01 01:59
Modified
2024-11-21 03:29
Severity ?
Summary
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C7152B8-3651-4A7B-BE5F-07C661A2796A",
                     versionEndIncluding: "0.6.32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B317E42-92DE-46B5-9120-A3C29FD35D39",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "07C312A0-CD2C-4B9C-B064-6409B25C278F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.",
      },
      {
         lang: "es",
         value: "avahi-daemon en Avahi, hasta las versiones 0.6.32 y 0.7, responde a consultas IPv6 unicast arbitrarias de manera inadvertida con direcciones de origen que no se pueden resolver localmente, lo que permite a los atacantes remotos provocar una denegación de servicio (amplificación de tráfico) y puede conducir a una fuga de información, obteniendo información potencialmente sensible del dispositivo de respuesta mediante paquetes UDP del puerto 5353. NOTA: podría solaparse con CVE-2015-2809.",
      },
   ],
   id: "CVE-2017-6519",
   lastModified: "2024-11-21T03:29:56.800",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-05-01T01:59:00.297",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/203",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3876-1/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3876-2/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.secfu.net/advisories",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/203",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3876-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/3876-2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.secfu.net/advisories",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-346",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-05-10 02:14
Modified
2024-11-21 00:10
Severity ?
Summary
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.
Impacted products
Vendor Product Version
avahi avahi 0.6.7
avahi avahi 0.6.8
avahi avahi 0.6.9



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C0D4625-24B2-4BF7-B32B-7BCC12C8BD1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8266D64B-B067-413E-BDA7-4AB770D4F570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99BF964-2FC8-45B5-AD69-4790179B8AF5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.",
      },
   ],
   evaluatorSolution: "The vendor has released version 0.6.10 to address these issues",
   id: "CVE-2006-2288",
   lastModified: "2024-11-21T00:10:59.200",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.6,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-05-10T02:14:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20022",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20215",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/17884",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26330",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20215",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/17884",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26330",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-05-10 02:14
Modified
2024-11-21 00:10
Severity ?
Summary
Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.
Impacted products
Vendor Product Version
avahi avahi 0.6.7
avahi avahi 0.6.8
avahi avahi 0.6.9



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C0D4625-24B2-4BF7-B32B-7BCC12C8BD1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8266D64B-B067-413E-BDA7-4AB770D4F570",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99BF964-2FC8-45B5-AD69-4790179B8AF5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.",
      },
   ],
   evaluatorSolution: "Update to version 0.6.10.",
   id: "CVE-2006-2289",
   lastModified: "2024-11-21T00:10:59.337",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-05-10T02:14:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/20022",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/20215",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/17884",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26331",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/20022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/20215",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/17884",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26331",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2023-38472
Vulnerability from cvelistv5
Published
2023-11-02 14:59
Modified
2024-08-29 14:17
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
References
https://access.redhat.com/security/cve/CVE-2023-38472vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2191692issue-tracking, x_refsource_REDHAT
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.632Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-38472",
               },
               {
                  name: "RHBZ#2191692",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191692",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38472",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T13:55:06.065680Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:17:10.800Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "avahi",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         datePublic: "2023-04-26T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "Reachable Assertion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-02T14:59:24.996Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-38472",
            },
            {
               name: "RHBZ#2191692",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191692",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Reachable assertion in avahi_rdata_parse",
         x_redhatCweChain: "CWE-617: Reachable Assertion",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-38472",
      datePublished: "2023-11-02T14:59:24.996Z",
      dateReserved: "2023-07-18T09:48:04.753Z",
      dateUpdated: "2024-08-29T14:17:10.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2006-2288
Vulnerability from cvelistv5
Published
2006-05-09 23:00
Modified
2024-08-07 17:43
Severity ?
Summary
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T17:43:29.034Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
               },
               {
                  name: "20022",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20022",
               },
               {
                  name: "17884",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/17884",
               },
               {
                  name: "SUSE-SR:2006:011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
               },
               {
                  name: "20215",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20215",
               },
               {
                  name: "avahi-mdns-name-dos(26330)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26330",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-05-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-19T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
            },
            {
               name: "20022",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20022",
            },
            {
               name: "17884",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/17884",
            },
            {
               name: "SUSE-SR:2006:011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
            },
            {
               name: "20215",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20215",
            },
            {
               name: "avahi-mdns-name-dos(26330)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26330",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-2288",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://0pointer.de/cgi-bin/viewcvs.cgi/*checkout*/trunk/docs/NEWS?root=avahi",
                     refsource: "CONFIRM",
                     url: "http://0pointer.de/cgi-bin/viewcvs.cgi/*checkout*/trunk/docs/NEWS?root=avahi",
                  },
                  {
                     name: "20022",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20022",
                  },
                  {
                     name: "17884",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/17884",
                  },
                  {
                     name: "SUSE-SR:2006:011",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
                  },
                  {
                     name: "20215",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20215",
                  },
                  {
                     name: "avahi-mdns-name-dos(26330)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26330",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-2288",
      datePublished: "2006-05-09T23:00:00",
      dateReserved: "2006-05-09T00:00:00",
      dateUpdated: "2024-08-07T17:43:29.034Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-1981
Vulnerability from cvelistv5
Published
2023-05-26 00:00
Modified
2025-01-15 21:38
Summary
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Impacted products
Vendor Product Version
n/a avahi Version: avahi-0.7-20
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T06:05:27.096Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-1981",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2185911",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://github.com/lathiat/avahi/issues/375",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 5.5,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "NONE",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-1981",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-15T21:38:14.751357Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-15T21:38:19.827Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "avahi",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "avahi-0.7-20",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-400",
                     description: "CWE-400",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-26T00:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               url: "https://access.redhat.com/security/cve/CVE-2023-1981",
            },
            {
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2185911",
            },
            {
               url: "https://github.com/lathiat/avahi/issues/375",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-1981",
      datePublished: "2023-05-26T00:00:00",
      dateReserved: "2023-04-11T00:00:00",
      dateUpdated: "2025-01-15T21:38:19.827Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2006-5461
Vulnerability from cvelistv5
Published
2006-11-14 22:00
Modified
2024-08-07 19:48
Severity ?
Summary
Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
References
http://secunia.com/advisories/22932third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23042third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_26_sr.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/22852third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/380-1/vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2006/4474vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/23020third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/22807third-party-advisory, x_refsource_SECUNIA
http://avahi.org/milestone/Avahi%200.6.15x_refsource_CONFIRM
http://securitytracker.com/id?1017257vdb-entry, x_refsource_SECTRACK
https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.htmlmailing-list, x_refsource_MLIST
http://www.mandriva.com/security/advisories?name=MDKSA-2006:215vendor-advisory, x_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilities/30207vdb-entry, x_refsource_XF
http://www.gentoo.org/security/en/glsa/glsa-200611-13.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/21016vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T19:48:30.555Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "22932",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22932",
               },
               {
                  name: "23042",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23042",
               },
               {
                  name: "SUSE-SR:2006:026",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
               },
               {
                  name: "22852",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22852",
               },
               {
                  name: "USN-380-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/380-1/",
               },
               {
                  name: "ADV-2006-4474",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/4474",
               },
               {
                  name: "23020",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23020",
               },
               {
                  name: "22807",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/22807",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://avahi.org/milestone/Avahi%200.6.15",
               },
               {
                  name: "1017257",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017257",
               },
               {
                  name: "[avahi-tickets] 20061106 [Avahi] #69: Avahi needs to check the originating process of netlink messages",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html",
               },
               {
                  name: "MDKSA-2006:215",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215",
               },
               {
                  name: "avahi-netlink-security-bypass(30207)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207",
               },
               {
                  name: "GLSA-200611-13",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml",
               },
               {
                  name: "21016",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/21016",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-11-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-03T20:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "22932",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22932",
            },
            {
               name: "23042",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23042",
            },
            {
               name: "SUSE-SR:2006:026",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
            },
            {
               name: "22852",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22852",
            },
            {
               name: "USN-380-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/380-1/",
            },
            {
               name: "ADV-2006-4474",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/4474",
            },
            {
               name: "23020",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23020",
            },
            {
               name: "22807",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/22807",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://avahi.org/milestone/Avahi%200.6.15",
            },
            {
               name: "1017257",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017257",
            },
            {
               name: "[avahi-tickets] 20061106 [Avahi] #69: Avahi needs to check the originating process of netlink messages",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html",
            },
            {
               name: "MDKSA-2006:215",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215",
            },
            {
               name: "avahi-netlink-security-bypass(30207)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207",
            },
            {
               name: "GLSA-200611-13",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml",
            },
            {
               name: "21016",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/21016",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2006-5461",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "22932",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/22932",
                  },
                  {
                     name: "23042",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23042",
                  },
                  {
                     name: "SUSE-SR:2006:026",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
                  },
                  {
                     name: "22852",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/22852",
                  },
                  {
                     name: "USN-380-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/380-1/",
                  },
                  {
                     name: "ADV-2006-4474",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/4474",
                  },
                  {
                     name: "23020",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23020",
                  },
                  {
                     name: "22807",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/22807",
                  },
                  {
                     name: "http://avahi.org/milestone/Avahi%200.6.15",
                     refsource: "CONFIRM",
                     url: "http://avahi.org/milestone/Avahi%200.6.15",
                  },
                  {
                     name: "1017257",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1017257",
                  },
                  {
                     name: "[avahi-tickets] 20061106 [Avahi] #69: Avahi needs to check the originating process of netlink messages",
                     refsource: "MLIST",
                     url: "https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html",
                  },
                  {
                     name: "MDKSA-2006:215",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:215",
                  },
                  {
                     name: "avahi-netlink-security-bypass(30207)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30207",
                  },
                  {
                     name: "GLSA-200611-13",
                     refsource: "GENTOO",
                     url: "http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml",
                  },
                  {
                     name: "21016",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/21016",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2006-5461",
      datePublished: "2006-11-14T22:00:00",
      dateReserved: "2006-10-23T00:00:00",
      dateUpdated: "2024-08-07T19:48:30.555Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38473
Vulnerability from cvelistv5
Published
2023-11-02 15:00
Modified
2024-08-29 14:16
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
References
https://access.redhat.com/security/cve/CVE-2023-38473vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2191694issue-tracking, x_refsource_REDHAT
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.627Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-38473",
               },
               {
                  name: "RHBZ#2191694",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191694",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38473",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T14:00:14.793605Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:16:49.059Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "avahi",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         datePublic: "2023-04-26T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "Reachable Assertion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-02T15:00:19.576Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-38473",
            },
            {
               name: "RHBZ#2191694",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191694",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Reachable assertion in avahi_alternative_host_name",
         x_redhatCweChain: "CWE-617: Reachable Assertion",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-38473",
      datePublished: "2023-11-02T15:00:19.576Z",
      dateReserved: "2023-07-18T09:48:04.753Z",
      dateUpdated: "2024-08-29T14:16:49.059Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-3502
Vulnerability from cvelistv5
Published
2021-05-07 11:46
Modified
2024-08-03 16:53
Severity ?
Summary
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Impacted products
Vendor Product Version
n/a avahi Version: 0.8-5
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T16:53:17.966Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/lathiat/avahi/issues/338",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "avahi",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "0.8-5",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "CWE-617->CWE-476",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-07T11:46:21",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1946914",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/lathiat/avahi/issues/338",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2021-3502",
      datePublished: "2021-05-07T11:46:21",
      dateReserved: "2021-04-15T00:00:00",
      dateUpdated: "2024-08-03T16:53:17.966Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2006-2289
Vulnerability from cvelistv5
Published
2006-05-09 23:00
Modified
2024-08-07 17:43
Severity ?
Summary
Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T17:43:29.085Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
               },
               {
                  name: "20022",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20022",
               },
               {
                  name: "17884",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/17884",
               },
               {
                  name: "avahi-core-bo(26331)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26331",
               },
               {
                  name: "SUSE-SR:2006:011",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
               },
               {
                  name: "20215",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/20215",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-05-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-19T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi",
            },
            {
               name: "20022",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20022",
            },
            {
               name: "17884",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/17884",
            },
            {
               name: "avahi-core-bo(26331)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26331",
            },
            {
               name: "SUSE-SR:2006:011",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
            },
            {
               name: "20215",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/20215",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-2289",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://0pointer.de/cgi-bin/viewcvs.cgi/*checkout*/trunk/docs/NEWS?root=avahi",
                     refsource: "CONFIRM",
                     url: "http://0pointer.de/cgi-bin/viewcvs.cgi/*checkout*/trunk/docs/NEWS?root=avahi",
                  },
                  {
                     name: "20022",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20022",
                  },
                  {
                     name: "17884",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/17884",
                  },
                  {
                     name: "avahi-core-bo(26331)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/26331",
                  },
                  {
                     name: "SUSE-SR:2006:011",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2006_05_19.html",
                  },
                  {
                     name: "20215",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/20215",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-2289",
      datePublished: "2006-05-09T23:00:00",
      dateReserved: "2006-05-09T00:00:00",
      dateUpdated: "2024-08-07T17:43:29.085Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2011-1002
Vulnerability from cvelistv5
Published
2011-02-22 18:00
Modified
2024-08-06 22:14
Severity ?
Summary
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
References
http://www.redhat.com/support/errata/RHSA-2011-0779.htmlvendor-advisory, x_refsource_REDHAT
https://exchange.xforce.ibmcloud.com/vulnerabilities/65525vdb-entry, x_refsource_XF
http://www.openwall.com/lists/oss-security/2011/02/22/9mailing-list, x_refsource_MLIST
http://www.redhat.com/support/errata/RHSA-2011-0436.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0511vdb-entry, x_refsource_VUPEN
http://openwall.com/lists/oss-security/2011/02/18/1mailing-list, x_refsource_MLIST
http://secunia.com/advisories/43605third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43465third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/43673third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0601vdb-entry, x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=667187x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2011/0969vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/65524vdb-entry, x_refsource_XF
http://secunia.com/advisories/44131third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2011:040vendor-advisory, x_refsource_MANDRIVA
http://www.securityfocus.com/bid/46446vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2011:037vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0448vdb-entry, x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2011/dsa-2174vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2011/0499vdb-entry, x_refsource_VUPEN
http://osvdb.org/70948vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/43361third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0670vdb-entry, x_refsource_VUPEN
http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/x_refsource_MISC
http://avahi.org/ticket/325x_refsource_CONFIRM
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0565vdb-entry, x_refsource_VUPEN
http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6x_refsource_CONFIRM
http://ubuntu.com/usn/usn-1084-1vendor-advisory, x_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/02/18/4mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T22:14:26.817Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2011:0779",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2011-0779.html",
               },
               {
                  name: "avahi-udp-packet-dos(65525)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525",
               },
               {
                  name: "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2011/02/22/9",
               },
               {
                  name: "RHSA-2011:0436",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2011-0436.html",
               },
               {
                  name: "ADV-2011-0511",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0511",
               },
               {
                  name: "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/02/18/1",
               },
               {
                  name: "43605",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43605",
               },
               {
                  name: "43465",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43465",
               },
               {
                  name: "43673",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43673",
               },
               {
                  name: "ADV-2011-0601",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0601",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
               },
               {
                  name: "ADV-2011-0969",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0969",
               },
               {
                  name: "avahi-udp-dos(65524)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524",
               },
               {
                  name: "44131",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/44131",
               },
               {
                  name: "MDVSA-2011:040",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040",
               },
               {
                  name: "46446",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/46446",
               },
               {
                  name: "MDVSA-2011:037",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037",
               },
               {
                  name: "ADV-2011-0448",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0448",
               },
               {
                  name: "SUSE-SR:2011:005",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
               },
               {
                  name: "DSA-2174",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2011/dsa-2174",
               },
               {
                  name: "ADV-2011-0499",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0499",
               },
               {
                  name: "70948",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/70948",
               },
               {
                  name: "43361",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43361",
               },
               {
                  name: "ADV-2011-0670",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0670",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://avahi.org/ticket/325",
               },
               {
                  name: "FEDORA-2011-3033",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html",
               },
               {
                  name: "ADV-2011-0565",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0565",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6",
               },
               {
                  name: "USN-1084-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://ubuntu.com/usn/usn-1084-1",
               },
               {
                  name: "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://openwall.com/lists/oss-security/2011/02/18/4",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2011-02-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-16T14:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "RHSA-2011:0779",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2011-0779.html",
            },
            {
               name: "avahi-udp-packet-dos(65525)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65525",
            },
            {
               name: "[oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2011/02/22/9",
            },
            {
               name: "RHSA-2011:0436",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2011-0436.html",
            },
            {
               name: "ADV-2011-0511",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0511",
            },
            {
               name: "[oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/02/18/1",
            },
            {
               name: "43605",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43605",
            },
            {
               name: "43465",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43465",
            },
            {
               name: "43673",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43673",
            },
            {
               name: "ADV-2011-0601",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0601",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=667187",
            },
            {
               name: "ADV-2011-0969",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0969",
            },
            {
               name: "avahi-udp-dos(65524)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/65524",
            },
            {
               name: "44131",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/44131",
            },
            {
               name: "MDVSA-2011:040",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:040",
            },
            {
               name: "46446",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/46446",
            },
            {
               name: "MDVSA-2011:037",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:037",
            },
            {
               name: "ADV-2011-0448",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0448",
            },
            {
               name: "SUSE-SR:2011:005",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
            },
            {
               name: "DSA-2174",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2011/dsa-2174",
            },
            {
               name: "ADV-2011-0499",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0499",
            },
            {
               name: "70948",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/70948",
            },
            {
               name: "43361",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43361",
            },
            {
               name: "ADV-2011-0670",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0670",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://avahi.org/ticket/325",
            },
            {
               name: "FEDORA-2011-3033",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html",
            },
            {
               name: "ADV-2011-0565",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0565",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902576f685d5ab3a6",
            },
            {
               name: "USN-1084-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://ubuntu.com/usn/usn-1084-1",
            },
            {
               name: "[oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://openwall.com/lists/oss-security/2011/02/18/4",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2011-1002",
      datePublished: "2011-02-22T18:00:00",
      dateReserved: "2011-02-14T00:00:00",
      dateUpdated: "2024-08-06T22:14:26.817Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38471
Vulnerability from cvelistv5
Published
2023-11-02 14:58
Modified
2024-08-29 14:17
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
References
https://access.redhat.com/security/cve/CVE-2023-38471vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2191691issue-tracking, x_refsource_REDHAT
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.630Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-38471",
               },
               {
                  name: "RHBZ#2191691",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191691",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38471",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T13:54:56.246487Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:17:30.825Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "avahi",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         datePublic: "2023-04-26T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "Reachable Assertion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-02T14:58:22.628Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-38471",
            },
            {
               name: "RHBZ#2191691",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191691",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Reachable assertion in dbus_set_host_name",
         x_redhatCweChain: "CWE-617: Reachable Assertion",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-38471",
      datePublished: "2023-11-02T14:58:22.628Z",
      dateReserved: "2023-07-18T09:48:04.753Z",
      dateUpdated: "2024-08-29T14:17:30.825Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38470
Vulnerability from cvelistv5
Published
2023-11-02 14:57
Modified
2024-08-29 14:21
Summary
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
References
https://access.redhat.com/security/cve/CVE-2023-38470vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2191690issue-tracking, x_refsource_REDHAT
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.623Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-38470",
               },
               {
                  name: "RHBZ#2191690",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191690",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38470",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T13:54:46.019977Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:21:01.506Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "avahi",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         datePublic: "2023-04-26T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "Reachable Assertion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-02T14:57:28.872Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-38470",
            },
            {
               name: "RHBZ#2191690",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191690",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Reachable assertion in avahi_escape_label",
         x_redhatCweChain: "CWE-617: Reachable Assertion",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-38470",
      datePublished: "2023-11-02T14:57:28.872Z",
      dateReserved: "2023-07-18T09:48:04.752Z",
      dateUpdated: "2024-08-29T14:21:01.506Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-3468
Vulnerability from cvelistv5
Published
2021-06-02 15:09
Modified
2025-02-13 16:28
Severity ?
Summary
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Impacted products
Vendor Product Version
n/a avahi Version: All avahi versions 0.6 up to 0.8
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T16:53:17.602Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1939614",
               },
               {
                  name: "[debian-lts-announce] 20220607 [SECURITY] [DLA 3047-1] avahi security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2023/06/msg00028.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "avahi",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "All avahi versions 0.6 up to 0.8",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-835",
                     description: "CWE-835",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-22T00:06:10.695Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1939614",
            },
            {
               name: "[debian-lts-announce] 20220607 [SECURITY] [DLA 3047-1] avahi security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
            },
            {
               url: "https://lists.debian.org/debian-lts-announce/2023/06/msg00028.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2021-3468",
      datePublished: "2021-06-02T15:09:21.000Z",
      dateReserved: "2021-03-26T00:00:00.000Z",
      dateUpdated: "2025-02-13T16:28:23.614Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2007-3372
Vulnerability from cvelistv5
Published
2007-06-22 21:00
Modified
2024-08-07 14:14
Severity ?
Summary
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
References
http://secunia.com/advisories/26083third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33220third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/472443/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securitytracker.com/id?1018706vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/33279third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_14_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/24614vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2007/2317vdb-entry, x_refsource_VUPEN
http://osvdb.org/37507vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/25811third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:185vendor-advisory, x_refsource_MANDRIVA
http://avahi.org/changeset/1482x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-696-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2008/dsa-1690vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/26791third-party-advisory, x_refsource_SECUNIA
http://avahi.org/milestone/Avahi%200.6.20x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/35036vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T14:14:12.932Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "26083",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26083",
               },
               {
                  name: "33220",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33220",
               },
               {
                  name: "20070628 FLEA-2007-0030-1: avahi avahi-glib avahi-sharp",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/472443/100/0/threaded",
               },
               {
                  name: "1018706",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1018706",
               },
               {
                  name: "33279",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33279",
               },
               {
                  name: "SUSE-SR:2007:014",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_14_sr.html",
               },
               {
                  name: "24614",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/24614",
               },
               {
                  name: "ADV-2007-2317",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2317",
               },
               {
                  name: "37507",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/37507",
               },
               {
                  name: "25811",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/25811",
               },
               {
                  name: "MDKSA-2007:185",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://avahi.org/changeset/1482",
               },
               {
                  name: "USN-696-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-696-1",
               },
               {
                  name: "DSA-1690",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1690",
               },
               {
                  name: "26791",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26791",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://avahi.org/milestone/Avahi%200.6.20",
               },
               {
                  name: "avahi-assert-dos(35036)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/35036",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-06-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-16T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "26083",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26083",
            },
            {
               name: "33220",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33220",
            },
            {
               name: "20070628 FLEA-2007-0030-1: avahi avahi-glib avahi-sharp",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/472443/100/0/threaded",
            },
            {
               name: "1018706",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1018706",
            },
            {
               name: "33279",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33279",
            },
            {
               name: "SUSE-SR:2007:014",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_14_sr.html",
            },
            {
               name: "24614",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/24614",
            },
            {
               name: "ADV-2007-2317",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2317",
            },
            {
               name: "37507",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/37507",
            },
            {
               name: "25811",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/25811",
            },
            {
               name: "MDKSA-2007:185",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://avahi.org/changeset/1482",
            },
            {
               name: "USN-696-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-696-1",
            },
            {
               name: "DSA-1690",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1690",
            },
            {
               name: "26791",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26791",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://avahi.org/milestone/Avahi%200.6.20",
            },
            {
               name: "avahi-assert-dos(35036)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/35036",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-3372",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "26083",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26083",
                  },
                  {
                     name: "33220",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33220",
                  },
                  {
                     name: "20070628 FLEA-2007-0030-1: avahi avahi-glib avahi-sharp",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/472443/100/0/threaded",
                  },
                  {
                     name: "1018706",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1018706",
                  },
                  {
                     name: "33279",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33279",
                  },
                  {
                     name: "SUSE-SR:2007:014",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_14_sr.html",
                  },
                  {
                     name: "24614",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/24614",
                  },
                  {
                     name: "ADV-2007-2317",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/2317",
                  },
                  {
                     name: "37507",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/37507",
                  },
                  {
                     name: "25811",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/25811",
                  },
                  {
                     name: "MDKSA-2007:185",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:185",
                  },
                  {
                     name: "http://avahi.org/changeset/1482",
                     refsource: "CONFIRM",
                     url: "http://avahi.org/changeset/1482",
                  },
                  {
                     name: "USN-696-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-696-1",
                  },
                  {
                     name: "DSA-1690",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1690",
                  },
                  {
                     name: "26791",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26791",
                  },
                  {
                     name: "http://avahi.org/milestone/Avahi%200.6.20",
                     refsource: "CONFIRM",
                     url: "http://avahi.org/milestone/Avahi%200.6.20",
                  },
                  {
                     name: "avahi-assert-dos(35036)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/35036",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-3372",
      datePublished: "2007-06-22T21:00:00",
      dateReserved: "2007-06-22T00:00:00",
      dateUpdated: "2024-08-07T14:14:12.932Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2008-5081
Vulnerability from cvelistv5
Published
2008-12-17 02:00
Modified
2024-08-07 10:40
Severity ?
Summary
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
References
http://secunia.com/advisories/33220third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2008/12/14/1mailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://secunia.com/advisories/33279third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987vdb-entry, signature, x_refsource_OVAL
http://www.ubuntu.com/usn/usn-696-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2008/dsa-1690vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/32825vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/7520exploit, x_refsource_EXPLOIT-DB
http://security.gentoo.org/glsa/glsa-200901-11.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/33153third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33475third-party-advisory, x_refsource_SECUNIA
http://avahi.org/milestone/Avahi%200.6.24x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T10:40:17.167Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "33220",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33220",
               },
               {
                  name: "[oss-security] 20081214 Avahi daemon DoS (CVE-2008-5081)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2008/12/14/1",
               },
               {
                  name: "SUSE-SR:2009:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html",
               },
               {
                  name: "33279",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33279",
               },
               {
                  name: "oval:org.mitre.oval:def:9987",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987",
               },
               {
                  name: "USN-696-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-696-1",
               },
               {
                  name: "DSA-1690",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1690",
               },
               {
                  name: "32825",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/32825",
               },
               {
                  name: "7520",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/7520",
               },
               {
                  name: "GLSA-200901-11",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200901-11.xml",
               },
               {
                  name: "33153",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33153",
               },
               {
                  name: "33475",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33475",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://avahi.org/milestone/Avahi%200.6.24",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-12-12T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "33220",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33220",
            },
            {
               name: "[oss-security] 20081214 Avahi daemon DoS (CVE-2008-5081)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2008/12/14/1",
            },
            {
               name: "SUSE-SR:2009:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html",
            },
            {
               name: "33279",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33279",
            },
            {
               name: "oval:org.mitre.oval:def:9987",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987",
            },
            {
               name: "USN-696-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-696-1",
            },
            {
               name: "DSA-1690",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1690",
            },
            {
               name: "32825",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/32825",
            },
            {
               name: "7520",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/7520",
            },
            {
               name: "GLSA-200901-11",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200901-11.xml",
            },
            {
               name: "33153",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33153",
            },
            {
               name: "33475",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33475",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://avahi.org/milestone/Avahi%200.6.24",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2008-5081",
      datePublished: "2008-12-17T02:00:00",
      dateReserved: "2008-11-14T00:00:00",
      dateUpdated: "2024-08-07T10:40:17.167Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26720
Vulnerability from cvelistv5
Published
2021-02-17 21:19
Modified
2024-08-03 20:33
Severity ?
Summary
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:33:40.829Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://packages.debian.org/buster/avahi-daemon",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://packages.debian.org/sid/avahi-daemon",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://packages.debian.org/bullseye/avahi-daemon",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
               },
               {
                  name: "[debian-lts-announce] 20220607 [SECURITY] [DLA 3047-1] avahi security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-07T20:06:12",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://packages.debian.org/buster/avahi-daemon",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://packages.debian.org/sid/avahi-daemon",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://packages.debian.org/bullseye/avahi-daemon",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
            },
            {
               name: "[debian-lts-announce] 20220607 [SECURITY] [DLA 3047-1] avahi security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2021-26720",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://packages.debian.org/buster/avahi-daemon",
                     refsource: "MISC",
                     url: "https://packages.debian.org/buster/avahi-daemon",
                  },
                  {
                     name: "https://packages.debian.org/sid/avahi-daemon",
                     refsource: "MISC",
                     url: "https://packages.debian.org/sid/avahi-daemon",
                  },
                  {
                     name: "https://packages.debian.org/bullseye/avahi-daemon",
                     refsource: "MISC",
                     url: "https://packages.debian.org/bullseye/avahi-daemon",
                  },
                  {
                     name: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
                     refsource: "MISC",
                     url: "https://security-tracker.debian.org/tracker/CVE-2021-26720",
                  },
                  {
                     name: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
                     refsource: "MISC",
                     url: "https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1870824",
                  },
                  {
                     name: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
                     refsource: "MISC",
                     url: "https://metadata.ftp-master.debian.org/changelogs/main/a/avahi/avahi_0.8-4_changelog",
                  },
                  {
                     name: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
                     refsource: "MISC",
                     url: "https://www.openwall.com/lists/oss-security/2021/02/15/2",
                  },
                  {
                     name: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
                     refsource: "MISC",
                     url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796",
                  },
                  {
                     name: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
                     refsource: "MISC",
                     url: "https://bugzilla.suse.com/show_bug.cgi?id=1180827",
                  },
                  {
                     name: "[debian-lts-announce] 20220607 [SECURITY] [DLA 3047-1] avahi security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2022/06/msg00009.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2021-26720",
      datePublished: "2021-02-17T21:19:26",
      dateReserved: "2021-02-05T00:00:00",
      dateUpdated: "2024-08-03T20:33:40.829Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2006-6870
Vulnerability from cvelistv5
Published
2007-01-05 00:00
Modified
2024-08-07 20:42
Severity ?
Summary
The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
References
http://secunia.com/advisories/23673third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2007:003vendor-advisory, x_refsource_MANDRIVA
http://www.avahi.org/#December2006x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0071vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/23644third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_007_suse.htmlvendor-advisory, x_refsource_SUSE
http://www.avahi.org/ticket/84x_refsource_CONFIRM
http://fedoranews.org/cms/node/2362vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/23660third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/24995third-party-advisory, x_refsource_SECUNIA
http://www.avahi.org/changeset/1340x_refsource_CONFIRM
http://fedoranews.org/cms/node/2408vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/23628third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/23782third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-402-1vendor-advisory, x_refsource_UBUNTU
http://www.securityfocus.com/bid/21881vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T20:42:07.511Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "23673",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23673",
               },
               {
                  name: "MDKSA-2007:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:003",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.avahi.org/#December2006",
               },
               {
                  name: "ADV-2007-0071",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/0071",
               },
               {
                  name: "23644",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23644",
               },
               {
                  name: "SUSE-SR:2007:007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_007_suse.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.avahi.org/ticket/84",
               },
               {
                  name: "FEDORA-2007-018",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/cms/node/2362",
               },
               {
                  name: "23660",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23660",
               },
               {
                  name: "24995",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24995",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.avahi.org/changeset/1340",
               },
               {
                  name: "FEDORA-2007-019",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://fedoranews.org/cms/node/2408",
               },
               {
                  name: "23628",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23628",
               },
               {
                  name: "23782",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/23782",
               },
               {
                  name: "USN-402-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-402-1",
               },
               {
                  name: "21881",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/21881",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-12-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2007-01-11T10:00:00",
            orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
            shortName: "canonical",
         },
         references: [
            {
               name: "23673",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23673",
            },
            {
               name: "MDKSA-2007:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:003",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.avahi.org/#December2006",
            },
            {
               name: "ADV-2007-0071",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/0071",
            },
            {
               name: "23644",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23644",
            },
            {
               name: "SUSE-SR:2007:007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_007_suse.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.avahi.org/ticket/84",
            },
            {
               name: "FEDORA-2007-018",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/cms/node/2362",
            },
            {
               name: "23660",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23660",
            },
            {
               name: "24995",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24995",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.avahi.org/changeset/1340",
            },
            {
               name: "FEDORA-2007-019",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://fedoranews.org/cms/node/2408",
            },
            {
               name: "23628",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23628",
            },
            {
               name: "23782",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/23782",
            },
            {
               name: "USN-402-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-402-1",
            },
            {
               name: "21881",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/21881",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@ubuntu.com",
               ID: "CVE-2006-6870",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "23673",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23673",
                  },
                  {
                     name: "MDKSA-2007:003",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:003",
                  },
                  {
                     name: "http://www.avahi.org/#December2006",
                     refsource: "CONFIRM",
                     url: "http://www.avahi.org/#December2006",
                  },
                  {
                     name: "ADV-2007-0071",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/0071",
                  },
                  {
                     name: "23644",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23644",
                  },
                  {
                     name: "SUSE-SR:2007:007",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_007_suse.html",
                  },
                  {
                     name: "http://www.avahi.org/ticket/84",
                     refsource: "CONFIRM",
                     url: "http://www.avahi.org/ticket/84",
                  },
                  {
                     name: "FEDORA-2007-018",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/cms/node/2362",
                  },
                  {
                     name: "23660",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23660",
                  },
                  {
                     name: "24995",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24995",
                  },
                  {
                     name: "http://www.avahi.org/changeset/1340",
                     refsource: "CONFIRM",
                     url: "http://www.avahi.org/changeset/1340",
                  },
                  {
                     name: "FEDORA-2007-019",
                     refsource: "FEDORA",
                     url: "http://fedoranews.org/cms/node/2408",
                  },
                  {
                     name: "23628",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23628",
                  },
                  {
                     name: "23782",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/23782",
                  },
                  {
                     name: "USN-402-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-402-1",
                  },
                  {
                     name: "21881",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/21881",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc",
      assignerShortName: "canonical",
      cveId: "CVE-2006-6870",
      datePublished: "2007-01-05T00:00:00",
      dateReserved: "2007-01-04T00:00:00",
      dateUpdated: "2024-08-07T20:42:07.511Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-38469
Vulnerability from cvelistv5
Published
2023-11-02 14:49
Modified
2024-08-29 14:21
Summary
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
References
https://access.redhat.com/security/cve/CVE-2023-38469vdb-entry, x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2191687issue-tracking, x_refsource_REDHAT
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T17:39:13.526Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "vdb-entry",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/security/cve/CVE-2023-38469",
               },
               {
                  name: "RHBZ#2191687",
                  tags: [
                     "issue-tracking",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191687",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-38469",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T13:53:35.768386Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:21:27.532Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "affected",
               product: "avahi",
               vendor: "n/a",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:6",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 6",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:7",
               ],
               defaultStatus: "unknown",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 7",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:8",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 8",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://access.redhat.com/downloads/content/package-browser/",
               cpes: [
                  "cpe:/o:redhat:enterprise_linux:9",
               ],
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Red Hat Enterprise Linux 9",
               vendor: "Red Hat",
            },
            {
               collectionURL: "https://packages.fedoraproject.org/",
               defaultStatus: "affected",
               packageName: "avahi",
               product: "Fedora",
               vendor: "Fedora",
            },
         ],
         datePublic: "2023-04-26T00:00:00+00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.",
            },
         ],
         metrics: [
            {
               other: {
                  content: {
                     namespace: "https://access.redhat.com/security/updates/classification/",
                     value: "Moderate",
                  },
                  type: "Red Hat severity rating",
               },
            },
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-617",
                     description: "Reachable Assertion",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-02T14:49:26.283Z",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               tags: [
                  "vdb-entry",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/security/cve/CVE-2023-38469",
            },
            {
               name: "RHBZ#2191687",
               tags: [
                  "issue-tracking",
                  "x_refsource_REDHAT",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2191687",
            },
         ],
         timeline: [
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Reported to Red Hat.",
            },
            {
               lang: "en",
               time: "2023-04-26T00:00:00+00:00",
               value: "Made public.",
            },
         ],
         title: "Reachable assertion in avahi_dns_packet_append_record",
         x_redhatCweChain: "CWE-617: Reachable Assertion",
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2023-38469",
      datePublished: "2023-11-02T14:49:26.283Z",
      dateReserved: "2023-07-18T09:48:04.752Z",
      dateUpdated: "2024-08-29T14:21:27.532Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2017-6519
Vulnerability from cvelistv5
Published
2017-05-01 01:00
Modified
2024-08-05 15:33
Severity ?
Summary
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T15:33:20.149Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
               },
               {
                  name: "USN-3876-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3876-1/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/lathiat/avahi/issues/203",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
               },
               {
                  name: "USN-3876-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/3876-2/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.secfu.net/advisories",
               },
               {
                  name: "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-30T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-29T11:06:42",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
            },
            {
               name: "USN-3876-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3876-1/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/lathiat/avahi/issues/203",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
            },
            {
               name: "USN-3876-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/3876-2/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.secfu.net/advisories",
            },
            {
               name: "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2017-6519",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
                     refsource: "MISC",
                     url: "https://github.com/lathiat/avahi/issues/203#issuecomment-449536790",
                  },
                  {
                     name: "USN-3876-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3876-1/",
                  },
                  {
                     name: "https://github.com/lathiat/avahi/issues/203",
                     refsource: "MISC",
                     url: "https://github.com/lathiat/avahi/issues/203",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
                     refsource: "MISC",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=1426712",
                  },
                  {
                     name: "USN-3876-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/3876-2/",
                  },
                  {
                     name: "https://www.secfu.net/advisories",
                     refsource: "MISC",
                     url: "https://www.secfu.net/advisories",
                  },
                  {
                     name: "[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2017-6519",
      datePublished: "2017-05-01T01:00:00",
      dateReserved: "2017-03-07T00:00:00",
      dateUpdated: "2024-08-05T15:33:20.149Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2010-2244
Vulnerability from cvelistv5
Published
2010-07-07 18:00
Modified
2024-08-07 02:25
Severity ?
Summary
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T02:25:07.561Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[oss-security] 20100625 Re: CVE Request: avahi DoS",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=oss-security&m=127748459505200&w=2",
               },
               {
                  name: "[oss-security] 20100623 CVE Request: avahi DoS",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2010/06/23/4",
               },
               {
                  name: "FEDORA-2010-10584",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
               },
               {
                  name: "MDVSA-2010:204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204",
               },
               {
                  name: "1024200",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1024200",
               },
               {
                  name: "DSA-2086",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2010/dsa-2086",
               },
               {
                  name: "FEDORA-2010-10581",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2010-06-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2010-07-30T09:00:00",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[oss-security] 20100625 Re: CVE Request: avahi DoS",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://marc.info/?l=oss-security&m=127748459505200&w=2",
            },
            {
               name: "[oss-security] 20100623 CVE Request: avahi DoS",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2010/06/23/4",
            },
            {
               name: "FEDORA-2010-10584",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043800.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=607293",
            },
            {
               name: "MDVSA-2010:204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2010:204",
            },
            {
               name: "1024200",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1024200",
            },
            {
               name: "DSA-2086",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2010/dsa-2086",
            },
            {
               name: "FEDORA-2010-10581",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043820.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2010-2244",
      datePublished: "2010-07-07T18:00:00",
      dateReserved: "2010-06-09T00:00:00",
      dateUpdated: "2024-08-07T02:25:07.561Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

var-201504-0377
Vulnerability from variot

The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. IBM Security Access Manager (ISAM) for Web (formerly known as IBM Tivoli Access Manager for e-business) is a set of products used in user authentication, authorization and Web single sign-on solutions of IBM Corporation in the United States. It provides user access management and Web application protection function. The following versions are affected: ISAM for Web 7.0 with firmware 7.0.0.11 and earlier, and ISAM for Web 8.0 with firmware 8.0.0.1 through 8.0.0.5 and 8.0.1.0

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0377",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.1.0",
         },
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.0.5",
         },
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.0.2",
         },
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.0.1",
         },
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.0.4",
         },
         {
            model: "security access manager for web 8.0",
            scope: "eq",
            trust: 1.6,
            vendor: "ibm",
            version: "8.0.0.3",
         },
         {
            model: "security access manager for web 7.0",
            scope: "lte",
            trust: 1,
            vendor: "ibm",
            version: "7.0.0.11",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "avahi mdns",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "canon",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "synology",
            version: null,
         },
         {
            model: "security access manager for web software",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "7.0.0 fp12",
         },
         {
            model: "security access manager for web software",
            scope: "lt",
            trust: 0.8,
            vendor: "ibm",
            version: "8.x",
         },
         {
            model: "security access manager for web software",
            scope: "lt",
            trust: 0.8,
            vendor: "ibm",
            version: "7.x",
         },
         {
            model: "security access manager for web software",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "8.0.1 fp1",
         },
         {
            model: "security access manager for web 7.0",
            scope: "eq",
            trust: 0.6,
            vendor: "ibm",
            version: "7.0.0.11",
         },
         {
            model: "color laserjet",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "47000",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.26",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.25",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.24",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.23",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.20",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.16",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.15",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.13",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.11",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.10",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.9",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.8",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.7",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.5.2",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "7.0.0.11",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Chad Seaman",
      sources: [
         {
            db: "BID",
            id: "73683",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-1892",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-1892",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-79853",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-1892",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201503-653",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-79853",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Multicast DNS (mDNS) responder in IBM Security Access Manager for Web 7.x before 7.0.0 FP12 and 8.x before 8.0.1 FP1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. IBM Security Access Manager (ISAM) for Web (formerly known as IBM Tivoli Access Manager for e-business) is a set of products used in user authentication, authorization and Web single sign-on solutions of IBM Corporation in the United States. It provides user access management and Web application protection function. The following versions are affected: ISAM for Web 7.0 with firmware 7.0.0.11 and earlier, and ISAM for Web 8.0 with firmware 8.0.0.1 through 8.0.0.5 and 8.0.1.0",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#550620",
            trust: 3.3,
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "73683",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU98589419",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-79853",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   id: "VAR-201504-0377",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:38:00.036000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "1699497",
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699497",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699497",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/550620",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1iv70911",
         },
         {
            trust: 1.7,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg1iv70913",
         },
         {
            trust: 1.6,
            url: "https://github.com/chadillac/mdns_recon",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/73683",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc6762.txt",
         },
         {
            trust: 0.8,
            url: "https://www.usa.canon.com/cusa/support/consumer?pagekeycode=prdadvdetail&docid=0901e02480ea9d5d",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1892",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu98589419/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1892",
         },
         {
            trust: 0.8,
            url: "https://tools.ietf.org/html/rfc6762#section-5.5",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-03-31T00:00:00",
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            date: "2015-04-01T00:00:00",
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            date: "2015-03-31T00:00:00",
            db: "BID",
            id: "73683",
         },
         {
            date: "2015-04-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            date: "2015-04-01T02:00:32.220000",
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            date: "2015-03-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-05-15T00:00:00",
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            date: "2016-08-04T00:00:00",
            db: "VULHUB",
            id: "VHN-79853",
         },
         {
            date: "2015-05-15T00:14:00",
            db: "BID",
            id: "73683",
         },
         {
            date: "2015-04-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-002048",
         },
         {
            date: "2016-08-04T03:25:56.670000",
            db: "NVD",
            id: "CVE-2015-1892",
         },
         {
            date: "2015-04-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multicast DNS (mDNS) implementations may respond to unicast queries originating outside the local link",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-653",
         },
      ],
      trust: 0.6,
   },
}

var-201504-0248
Vulnerability from variot

The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0248",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "diskstation manager",
            scope: "lte",
            trust: 1,
            vendor: "synology",
            version: "3.0",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "avahi mdns",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "canon",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "synology",
            version: null,
         },
         {
            model: "diskstation manager",
            scope: "lt",
            trust: 0.8,
            vendor: "synology",
            version: "3.1",
         },
         {
            model: "diskstation manager",
            scope: "eq",
            trust: 0.6,
            vendor: "synology",
            version: "3.0",
         },
         {
            model: "color laserjet",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "47000",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.26",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.25",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.24",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.23",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.20",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.16",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.15",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.13",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.11",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.10",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.9",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.8",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.6.7",
         },
         {
            model: "avahi",
            scope: "eq",
            trust: 0.3,
            vendor: "avahi",
            version: "0.5.2",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "3.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Chad Seaman",
      sources: [
         {
            db: "BID",
            id: "73683",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2015-2809",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2015-2809",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-80770",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2015-2809",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201503-655",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-80770",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Multicast DNS (mDNS) responder in Synology DiskStation Manager (DSM) before 3.1 inadvertently responds to unicast queries with source addresses that are not link-local, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets to the Avahi component. Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Multiple products are prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition. Other attacks are also possible. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information",
      sources: [
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#550620",
            trust: 3.3,
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "73683",
            trust: 1.4,
         },
         {
            db: "JVN",
            id: "JVNVU98589419",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
            trust: 0.7,
         },
         {
            db: "VULHUB",
            id: "VHN-80770",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   id: "VAR-201504-0248",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:38:00.068000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "DiskStation Manager 5.1",
            trust: 0.8,
            url: "https://www.synology.com/en-global/dsm/",
         },
         {
            title: "DSM_RS3411xs_1760",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54792",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/550620",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/bluu-9tlshd",
         },
         {
            trust: 1.6,
            url: "https://github.com/chadillac/mdns_recon",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/bid/73683",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc6762.txt",
         },
         {
            trust: 0.8,
            url: "https://www.usa.canon.com/cusa/support/consumer?pagekeycode=prdadvdetail&docid=0901e02480ea9d5d",
         },
         {
            trust: 0.8,
            url: "http://www-01.ibm.com/support/docview.wss?uid=swg21699497",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-2809",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/vu/jvnvu98589419/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-2809",
         },
         {
            trust: 0.8,
            url: "https://tools.ietf.org/html/rfc6762#section-5.5",
         },
         {
            trust: 0.8,
            url: "http://lists.freedesktop.org/archives/avahi/2010-november/001952.html",
         },
         {
            trust: 0.3,
            url: "http://www.ibm.com/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            db: "BID",
            id: "73683",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-03-31T00:00:00",
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            date: "2015-04-01T00:00:00",
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            date: "2015-03-31T00:00:00",
            db: "BID",
            id: "73683",
         },
         {
            date: "2015-04-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            date: "2015-04-01T02:00:35.970000",
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            date: "2015-03-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2015-05-15T00:00:00",
            db: "CERT/CC",
            id: "VU#550620",
         },
         {
            date: "2016-07-29T00:00:00",
            db: "VULHUB",
            id: "VHN-80770",
         },
         {
            date: "2015-05-15T00:14:00",
            db: "BID",
            id: "73683",
         },
         {
            date: "2015-04-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2015-002046",
         },
         {
            date: "2016-07-29T19:08:16.193000",
            db: "NVD",
            id: "CVE-2015-2809",
         },
         {
            date: "2015-04-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multicast DNS (mDNS) implementations may respond to unicast queries originating outside the local link",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#550620",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201503-655",
         },
      ],
      trust: 0.6,
   },
}