Note:
This project will be discontinued after December 13, 2021. [more]
2017-05-01
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Products | Avahi, Ubuntu_linux |
Type | Origin Validation Error (CWE-346) |
First patch | - None (likely due to unavailable code) |
Links |
• https://www.secfu.net/advisories
• https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E • https://github.com/lathiat/avahi/issues/203#issuecomment-449536790 • https://github.com/lathiat/avahi/issues/203 • https://usn.ubuntu.com/3876-1/ |