vendor:
Avahi mDNS Daemon
by:
Jon Oberheide
7.8
CVSS
HIGH
Denial of Service (DoS)
399
CWE
Product Name: Avahi mDNS Daemon
Affected Version From: < 0.6.24
Affected Version To: < 0.6.24
Patch Exists: YES
Related CWE: CVE-2008-5081
CPE: a:avahi:avahi
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2010-0528/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2010-2244/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2010-2244/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2008-5081/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0013/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2008-5081/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2008-5081/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
Avahi mDNS Daemon Remote DoS < 0.6.24
A crafted mDNS packet with source port 0 can cause avahi-daemon to abort() due to failed assertion assert(port > 0); in originates_from_local_legacy_unicast_socket() function in avahi-core/server.c.
Mitigation:
Upgrade to the latest version of Avahi mDNS Daemon