6.1 Medium
AI Score
Confidence
Low
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
30.4%
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
CPE | Name | Operator | Version |
---|---|---|---|
avahi:avahi | avahi | le | 0.6.19 |
avahi.org/changeset/1482
avahi.org/milestone/Avahi%200.6.20
osvdb.org/37507
secunia.com/advisories/25811
secunia.com/advisories/26083
secunia.com/advisories/26791
secunia.com/advisories/33220
secunia.com/advisories/33279
www.debian.org/security/2008/dsa-1690
www.mandriva.com/security/advisories?name=MDKSA-2007:185
www.novell.com/linux/security/advisories/2007_14_sr.html
www.securityfocus.com/archive/1/472443/100/0/threaded
www.securityfocus.com/bid/24614
www.securitytracker.com/id?1018706
www.ubuntu.com/usn/usn-696-1
www.vupen.com/english/advisories/2007/2317
exchange.xforce.ibmcloud.com/vulnerabilities/35036
More