avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
CPE | Name | Operator | Version |
---|---|---|---|
avahi | le | 0.6.32 | |
avahi | eq | 0.7 | |
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 18.10 |
bugzilla.redhat.com/show_bug.cgi?id=1426712
github.com/lathiat/avahi/issues/203
github.com/lathiat/avahi/issues/203
lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
usn.ubuntu.com/3876-1/
usn.ubuntu.com/3876-2/
www.secfu.net/advisories