ID SECURITYVULNS:VULN:9750
Type securityvulns
Reporter BUGTRAQ
Modified 2009-03-17T00:00:00
Description
Resources exhaustions on mDNS packet parsing.
{"id": "SECURITYVULNS:VULN:9750", "bulletinFamily": "software", "title": "Avahi multicast DNS server DoS", "description": "Resources exhaustions on mDNS packet parsing.", "published": "2009-03-17T00:00:00", "modified": "2009-03-17T00:00:00", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9750", "reporter": "BUGTRAQ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:21492"], "cvelist": ["CVE-2009-0758"], "type": "securityvulns", "lastseen": "2018-08-31T11:09:32", "history": [], "edition": 1, "hashmap": [{"key": "affectedSoftware", "hash": "e9caceb94b57b1daf321757151f8a7d6"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "e82317af1243d5eb29d11c9bb8244efa"}, {"key": "cvss", "hash": "ed3111898fb94205e2b64cefef5a2081"}, {"key": "description", "hash": "21e84a3905dd45b1df482a26810ce397"}, {"key": "href", "hash": "886b1e9f03719902b7e6250c20154565"}, {"key": "modified", "hash": "fad3625930f40552d74a9fa76657c852"}, {"key": "published", "hash": "fad3625930f40552d74a9fa76657c852"}, {"key": "references", "hash": "f2a8ebec1e9676aa63d2ea8b2eb1d107"}, {"key": "reporter", "hash": "2c5cca82a8670da097919f6160833daf"}, {"key": "title", "hash": "844988019be1b0b6cc8f73d6feffa373"}, {"key": "type", "hash": "d54751dd75af2ea0147b462b3e001cd0"}], "hash": "341984c8752a21a712fb0a9ef5f44f12f8b16e766d4a54c1731779d31a209c31", "viewCount": 1, "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2018-08-31T11:09:32"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2009-0758"]}, {"type": "nessus", "idList": ["MANDRIVA_MDVSA-2009-076.NASL", "SUSE_11_0_AVAHI-100119.NASL", "SUSE_11_AVAHI-100119.NASL", "SUSE_AVAHI-6787.NASL", "SUSE_AVAHI-6790.NASL", "GENTOO_GLSA-200904-10.NASL", "SUSE_11_1_AVAHI-100119.NASL", "SL_20100713_AVAHI_ON_SL5_X.NASL", "UBUNTU_USN-992-1.NASL", "DEBIAN_DSA-2086.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:63588", "OPENVAS:63804", "OPENVAS:136141256231063804", "OPENVAS:136141256231063588", "OPENVAS:1361412562310880614", "OPENVAS:67842", "OPENVAS:1361412562310870289", "OPENVAS:136141256231067842", "OPENVAS:880614", "OPENVAS:870289"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:21492", "SECURITYVULNS:DOC:24383"]}, {"type": "gentoo", "idList": ["GLSA-200904-10"]}, {"type": "redhat", "idList": ["RHSA-2010:0528", "RHSA-2010:0622"]}, {"type": "centos", "idList": ["CESA-2010:0528"]}, {"type": "debian", "idList": ["DEBIAN:DSA-2086-1:21155"]}, {"type": "oraclelinux", "idList": ["ELSA-2010-0528"]}, {"type": "ubuntu", "idList": ["USN-992-1"]}], "modified": "2018-08-31T11:09:32"}, "vulnersScore": 5.0}, "objectVersion": "1.3", "affectedSoftware": [{"name": "Avahi", "operator": "eq", "version": "0.6"}]}
{"cve": [{"lastseen": "2016-09-03T12:08:46", "bulletinFamily": "NVD", "description": "The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.", "modified": "2010-08-12T10:13:50", "published": "2009-03-03T11:30:05", "id": "CVE-2009-0758", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0758", "title": "CVE-2009-0758", "type": "cve", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-01-16T20:09:07", "bulletinFamily": "scanner", "description": "A security vulnerability has been identified and fixed in avahi which\ncould allow remote attackers to cause a denial of service (network\nbandwidth and CPU consumption) via a crafted legacy unicast mDNS query\npacket (CVE-2009-0758).\n\nThe updated packages have been patched to prevent this.", "modified": "2018-07-19T00:00:00", "published": "2009-04-23T00:00:00", "id": "MANDRIVA_MDVSA-2009-076.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=37087", "title": "Mandriva Linux Security Advisory : avahi (MDVSA-2009:076)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 70103\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:076. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(37087);\n script_version (\"1.12\");\n script_cvs_date(\"Date: 2018/07/19 20:59:16\");\n\n script_cve_id(\"CVE-2009-0758\");\n script_bugtraq_id(33946);\n script_xref(name:\"MDVSA\", value:\"2009:076\");\n\n script_name(english:\"Mandriva Linux Security Advisory : avahi (MDVSA-2009:076)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A security vulnerability has been identified and fixed in avahi which\ncould allow remote attackers to cause a denial of service (network\nbandwidth and CPU consumption) via a crafted legacy unicast mDNS query\npacket (CVE-2009-0758).\n\nThe updated packages have been patched to prevent this.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:ND\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi-dnsconfd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi-python\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi-sharp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi-sharp-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:avahi-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-client-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-client3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-client3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-common-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-common3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-common3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-howl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-core-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-core5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-glib1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-glib1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-gobject-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-gobject0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt3_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt3_1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt4_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-qt4_1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-ui-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-ui1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64avahi-ui1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-client-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-client3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-client3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-common-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-common3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-common3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-howl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-howl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-howl0-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-core-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-core5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-glib1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-glib1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-gobject-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-gobject0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt3_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt3_1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt4_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-qt4_1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-ui-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-ui1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libavahi-ui1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2009.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-dnsconfd-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-python-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-sharp-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-sharp-doc-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"avahi-x11-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-client3-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-client3-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-common3-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-common3-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl0-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl0-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-core5-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-core5-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-glib1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-glib1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt3_1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt3_1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt4_1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt4_1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-ui1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64avahi-ui1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-client3-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-client3-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-common3-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-common3-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-compat-howl0-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-compat-howl0-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-core5-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-core5-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-glib1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-glib1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-qt3_1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-qt3_1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-qt4_1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-qt4_1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-ui1-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libavahi-ui1-devel-0.6.21-2.2mdv2008.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-dnsconfd-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-python-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-sharp-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-sharp-doc-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", reference:\"avahi-x11-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-client-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-client3-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-common-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-common3-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl0-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-core-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-core5-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-glib-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-glib1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-gobject-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-gobject0-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-qt3-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-qt3_1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-qt4-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-qt4_1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-ui-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"x86_64\", reference:\"lib64avahi-ui1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-client-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-client3-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-common-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-common3-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-compat-howl-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-compat-howl0-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-core-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-core5-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-glib-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-glib1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-gobject-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-gobject0-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-qt3-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-qt3_1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-qt4-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-qt4_1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-ui-devel-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.1\", cpu:\"i386\", reference:\"libavahi-ui1-0.6.22-3.2mdv2008.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-dnsconfd-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-python-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-sharp-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-sharp-doc-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", reference:\"avahi-x11-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-client-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-client3-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-common-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-common3-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-howl0-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-compat-libdns_sd1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-core-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-core5-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-glib-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-glib1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-gobject-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-gobject0-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt3-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt3_1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt4-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-qt4_1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-ui-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"x86_64\", reference:\"lib64avahi-ui1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-client-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-client3-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-common-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-common3-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-compat-howl-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-compat-howl0-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-compat-libdns_sd1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-core-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-core5-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-glib-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-glib1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-gobject-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-gobject0-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-qt3-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-qt3_1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-qt4-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-qt4_1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-ui-devel-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2009.0\", cpu:\"i386\", reference:\"libavahi-ui1-0.6.23-1.2mdv2009.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:10:18", "bulletinFamily": "scanner", "description": "The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.", "modified": "2013-10-25T00:00:00", "published": "2010-02-02T00:00:00", "id": "SUSE_11_AVAHI-100119.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44378", "title": "SuSE 11 Security Update : avahi (SAT Patch Number 1827)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44378);\n script_version(\"$Revision: 1.9 $\");\n script_cvs_date(\"$Date: 2013/10/25 23:41:52 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n\n script_name(english:\"SuSE 11 Security Update : avahi (SAT Patch Number 1827)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=480865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0758.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 1827.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:avahi-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libavahi-client3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libavahi-client3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libavahi-common3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libavahi-common3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libavahi-core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libdns_sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:libdns_sd-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (pl) audit(AUDIT_OS_NOT, \"SuSE 11.0\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"avahi-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"avahi-lang-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libavahi-client3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libavahi-common3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libavahi-core5-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"i586\", reference:\"libdns_sd-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"avahi-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"avahi-lang-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-client3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-client3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-common3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-common3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-core5-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libdns_sd-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:0, cpu:\"x86_64\", reference:\"libdns_sd-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"avahi-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"avahi-lang-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libavahi-client3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libavahi-common3-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libavahi-core5-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, reference:\"libdns_sd-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libavahi-client3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libavahi-common3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"s390x\", reference:\"libdns_sd-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-client3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libavahi-common3-32bit-0.6.23-11.14.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:0, cpu:\"x86_64\", reference:\"libdns_sd-32bit-0.6.23-11.14.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:10:18", "bulletinFamily": "scanner", "description": "The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758).", "modified": "2014-06-13T00:00:00", "published": "2010-02-02T00:00:00", "id": "SUSE_11_0_AVAHI-100119.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44361", "title": "openSUSE Security Update : avahi (avahi-1832)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update avahi-1832.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44361);\n script_version(\"$Revision: 1.6 $\");\n script_cvs_date(\"$Date: 2014/06/13 19:38:12 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n\n script_name(english:\"openSUSE Security Update : avahi (avahi-1832)\");\n script_summary(english:\"Check for the avahi-1832 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=480865\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected avahi packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-compat-howl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-compat-mDNSResponder-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-utils-gtk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-client3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-client3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-common3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-common3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-gobject-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-gobject0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-ui0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdns_sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdns_sd-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libhowl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-compat-howl-devel-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-compat-mDNSResponder-devel-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-lang-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-utils-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"avahi-utils-gtk-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-client3-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-common3-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-core5-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-devel-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-glib-devel-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-glib1-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-gobject-devel-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-gobject0-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libavahi-ui0-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libdns_sd-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"libhowl0-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", reference:\"python-avahi-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libavahi-client3-32bit-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libavahi-common3-32bit-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libavahi-glib1-32bit-0.6.22-68.4\") ) flag++;\nif ( rpm_check(release:\"SUSE11.0\", cpu:\"x86_64\", reference:\"libdns_sd-32bit-0.6.22-68.4\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"avahi / avahi-compat-howl-devel / avahi-compat-mDNSResponder-devel / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:11:40", "bulletinFamily": "scanner", "description": "The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.", "modified": "2012-05-17T00:00:00", "published": "2011-01-27T00:00:00", "id": "SUSE_AVAHI-6787.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=51719", "title": "SuSE 10 Security Update : avahi (ZYPP Patch Number 6787)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(51719);\n script_version (\"$Revision: 1.3 $\");\n script_cvs_date(\"$Date: 2012/05/17 10:53:20 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n\n script_name(english:\"SuSE 10 Security Update : avahi (ZYPP Patch Number 6787)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0758.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6787.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/01/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"avahi-0.6.5-29.22.2\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:2, reference:\"avahi-glib-0.6.5-29.22.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:11:08", "bulletinFamily": "scanner", "description": "The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.", "modified": "2012-05-17T00:00:00", "published": "2010-10-11T00:00:00", "id": "SUSE_AVAHI-6790.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=49831", "title": "SuSE 10 Security Update : avahi (ZYPP Patch Number 6790)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(49831);\n script_version (\"$Revision: 1.5 $\");\n script_cvs_date(\"$Date: 2012/05/17 10:53:20 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n\n script_name(english:\"SuSE 10 Security Update : avahi (ZYPP Patch Number 6790)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758). This has been fixed.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2009-0758.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 6790.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2012 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"avahi-0.6.5-29.26.1\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:3, reference:\"avahi-glib-0.6.5-29.26.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"avahi-0.6.5-29.26.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:08:59", "bulletinFamily": "scanner", "description": "The remote host is affected by the vulnerability described in GLSA-200904-10\n(Avahi: Denial of Service)\n\n Rob Leslie reported that the\n originates_from_local_legacy_unicast_socket() function in\n avahi-core/server.c does not account for the network byte order of a\n port number when processing incoming multicast packets, leading to a\n multicast packet storm.\nImpact :\n\n A remote attacker could send specially crafted legacy unicast mDNS\n query packets to the Avahi daemon, resulting in a Denial of Service due\n to network bandwidth and CPU consumption.\nWorkaround :\n\n There is no known workaround at this time.", "modified": "2015-04-13T00:00:00", "published": "2009-04-11T00:00:00", "id": "GENTOO_GLSA-200904-10.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=36138", "title": "GLSA-200904-10 : Avahi: Denial of Service", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200904-10.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(36138);\n script_version(\"$Revision: 1.10 $\");\n script_cvs_date(\"$Date: 2015/04/13 14:11:59 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n script_xref(name:\"GLSA\", value:\"200904-10\");\n\n script_name(english:\"GLSA-200904-10 : Avahi: Denial of Service\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200904-10\n(Avahi: Denial of Service)\n\n Rob Leslie reported that the\n originates_from_local_legacy_unicast_socket() function in\n avahi-core/server.c does not account for the network byte order of a\n port number when processing incoming multicast packets, leading to a\n multicast packet storm.\n \nImpact :\n\n A remote attacker could send specially crafted legacy unicast mDNS\n query packets to the Avahi daemon, resulting in a Denial of Service due\n to network bandwidth and CPU consumption.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200904-10\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Avahi users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-dns/avahi-0.6.24-r2'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/04/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-dns/avahi\", unaffected:make_list(\"ge 0.6.24-r2\"), vulnerable:make_list(\"lt 0.6.24-r2\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Avahi\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:10:18", "bulletinFamily": "scanner", "description": "The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758).", "modified": "2014-06-13T00:00:00", "published": "2010-02-02T00:00:00", "id": "SUSE_11_1_AVAHI-100119.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=44367", "title": "openSUSE Security Update : avahi (avahi-1832)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update avahi-1832.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(44367);\n script_version(\"$Revision: 1.6 $\");\n script_cvs_date(\"$Date: 2014/06/13 19:49:33 $\");\n\n script_cve_id(\"CVE-2009-0758\");\n\n script_name(english:\"openSUSE Security Update : avahi (avahi-1832)\");\n script_summary(english:\"Check for the avahi-1832 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The avahi-daemon reflector could cause packet storms when reflecting\nlegacy unicast mDNS traffic (CVE-2009-0758).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=480865\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected avahi packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-compat-howl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-compat-mDNSResponder-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:avahi-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-client3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-client3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-common3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-common3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-glib1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-gobject-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-gobject0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libavahi-ui0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdns_sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdns_sd-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libhowl0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python-avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/02/02\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.1\", reference:\"avahi-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"avahi-compat-howl-devel-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"avahi-compat-mDNSResponder-devel-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"avahi-lang-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"avahi-utils-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-client3-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-common3-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-core5-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-devel-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-glib-devel-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-glib1-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-gobject-devel-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-gobject0-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libavahi-ui0-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libdns_sd-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"libhowl0-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", reference:\"python-avahi-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libavahi-client3-32bit-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libavahi-common3-32bit-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libavahi-glib1-32bit-0.6.23-9.11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.1\", cpu:\"x86_64\", reference:\"libdns_sd-32bit-0.6.23-9.11.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"avahi / avahi-compat-howl-devel / avahi-compat-mDNSResponder-devel / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:10:55", "bulletinFamily": "scanner", "description": "Several vulnerabilities have been discovered in the Avahi mDNS/DNS-SD\ndaemon. The Common Vulnerabilities and Exposures project identifies\nthe following problems :\n\n - CVE-2009-0758\n Rob Leslie discovered a denial of service vulnerability\n in the code used to reflect unicast mDNS traffic.\n\n - CVE-2010-2244\n Ludwig Nussel discovered a denial of service\n vulnerability in the processing of malformed DNS\n packets.", "modified": "2018-11-10T00:00:00", "published": "2010-08-05T00:00:00", "id": "DEBIAN_DSA-2086.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=48248", "title": "Debian DSA-2086-1 : avahi - several vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2086. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(48248);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/10 11:49:34\");\n\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_bugtraq_id(33946, 41075);\n script_xref(name:\"DSA\", value:\"2086\");\n\n script_name(english:\"Debian DSA-2086-1 : avahi - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the Avahi mDNS/DNS-SD\ndaemon. The Common Vulnerabilities and Exposures project identifies\nthe following problems :\n\n - CVE-2009-0758\n Rob Leslie discovered a denial of service vulnerability\n in the code used to reflect unicast mDNS traffic.\n\n - CVE-2010-2244\n Ludwig Nussel discovered a denial of service\n vulnerability in the processing of malformed DNS\n packets.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2009-0758\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2010-2244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2010/dsa-2086\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the Avahi packages.\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 0.6.23-3lenny2.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/08/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"avahi-autoipd\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-daemon\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-dbg\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-discover\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-dnsconfd\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-ui-utils\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"avahi-utils\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-client-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-client3\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-common-data\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-common-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-common3\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-compat-howl-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-compat-howl0\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-compat-libdnssd-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-compat-libdnssd1\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-core-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-core5\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-glib-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-glib1\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-gobject-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-gobject0\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-qt3-1\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-qt3-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-qt4-1\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-qt4-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-ui-dev\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"libavahi-ui0\", reference:\"0.6.23-3lenny2\")) flag++;\nif (deb_check(release:\"5.0\", prefix:\"python-avahi\", reference:\"0.6.23-3lenny2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:10:53", "bulletinFamily": "scanner", "description": "Updated avahi packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nAvahi is an implementation of the DNS Service Discovery and Multicast\nDNS specifications for Zero Configuration Networking. It facilitates\nservice discovery on a local network. Avahi and Avahi-aware\napplications allow you to plug your computer into a network and, with\nno configuration, view other people to chat with, view printers to\nprint to, and find shared files on other computers.\n\nA flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on\nthe local network could use this flaw to cause avahi-daemon on a\ntarget system to exit unexpectedly via specially crafted mDNS packets.\n(CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast\nmDNS messages. If the mDNS reflector were enabled on a system, an\nattacker on the local network could send a specially crafted unicast\nmDNS message to that system, resulting in its avahi-daemon flooding\nthe network with a multicast packet storm, and consuming a large\namount of CPU. Note: The mDNS reflector is disabled by default.\n(CVE-2009-0758)\n\nAll users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe update, avahi-daemon will be restarted automatically.", "modified": "2018-11-28T00:00:00", "published": "2010-07-28T00:00:00", "id": "REDHAT-RHSA-2010-0528.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=47874", "title": "RHEL 5 : avahi (RHSA-2010:0528)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2010:0528. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(47874);\n script_version (\"1.14\");\n script_cvs_date(\"Date: 2018/11/28 11:42:04\");\n\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_bugtraq_id(33946, 41075);\n script_xref(name:\"RHSA\", value:\"2010:0528\");\n\n script_name(english:\"RHEL 5 : avahi (RHSA-2010:0528)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated avahi packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nAvahi is an implementation of the DNS Service Discovery and Multicast\nDNS specifications for Zero Configuration Networking. It facilitates\nservice discovery on a local network. Avahi and Avahi-aware\napplications allow you to plug your computer into a network and, with\nno configuration, view other people to chat with, view printers to\nprint to, and find shared files on other computers.\n\nA flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on\nthe local network could use this flaw to cause avahi-daemon on a\ntarget system to exit unexpectedly via specially crafted mDNS packets.\n(CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast\nmDNS messages. If the mDNS reflector were enabled on a system, an\nattacker on the local network could send a specially crafted unicast\nmDNS message to that system, resulting in its avahi-daemon flooding\nthe network with a multicast packet storm, and consuming a large\namount of CPU. Note: The mDNS reflector is disabled by default.\n(CVE-2009-0758)\n\nAll users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues. After installing\nthe update, avahi-daemon will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2009-0758\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2010-2244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2010:0528\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-compat-howl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-compat-howl-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-compat-libdns_sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-compat-libdns_sd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-qt3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-qt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:avahi-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/07/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2010:0528\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-compat-howl-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-compat-howl-devel-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-compat-libdns_sd-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-compat-libdns_sd-devel-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-devel-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-glib-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-glib-devel-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-qt3-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", reference:\"avahi-qt3-devel-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"avahi-tools-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"avahi-tools-0.6.16-9.el5_5\")) flag++;\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"avahi-tools-0.6.16-9.el5_5\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"avahi / avahi-compat-howl / avahi-compat-howl-devel / etc\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-01-16T20:14:20", "bulletinFamily": "scanner", "description": "A flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on\nthe local network could use this flaw to cause avahi-daemon on a\ntarget system to exit unexpectedly via specially crafted mDNS packets.\n(CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast\nmDNS messages. If the mDNS reflector were enabled on a system, an\nattacker on the local network could send a specially crafted unicast\nmDNS message to that system, resulting in its avahi-daemon flooding\nthe network with a multicast packet storm, and consuming a large\namount of CPU. Note: The mDNS reflector is disabled by default.\n(CVE-2009-0758)\n\nAfter installing the update, avahi-daemon will be restarted\nautomatically.", "modified": "2019-01-02T00:00:00", "published": "2012-08-01T00:00:00", "id": "SL_20100713_AVAHI_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=60814", "title": "Scientific Linux Security Update : avahi on SL5.x i386/x86_64", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(60814);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/01/02 10:36:43\");\n\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n\n script_name(english:\"Scientific Linux Security Update : avahi on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on\nthe local network could use this flaw to cause avahi-daemon on a\ntarget system to exit unexpectedly via specially crafted mDNS packets.\n(CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast\nmDNS messages. If the mDNS reflector were enabled on a system, an\nattacker on the local network could send a specially crafted unicast\nmDNS message to that system, resulting in its avahi-daemon flooding\nthe network with a multicast packet storm, and consuming a large\namount of CPU. Note: The mDNS reflector is disabled by default.\n(CVE-2009-0758)\n\nAfter installing the update, avahi-daemon will be restarted\nautomatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1007&L=scientific-linux-errata&T=0&P=1275\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c50576e8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cwe_id(399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"avahi-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-compat-howl-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-compat-howl-devel-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-compat-libdns_sd-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-compat-libdns_sd-devel-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-devel-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-glib-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-glib-devel-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-qt3-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-qt3-devel-0.6.16-9.el5_5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"avahi-tools-0.6.16-9.el5_5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-24T12:57:15", "bulletinFamily": "scanner", "description": "The remote host is missing an update to avahi\nannounced via advisory MDVSA-2009:076.", "modified": "2017-07-06T00:00:00", "published": "2009-03-20T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63588", "id": "OPENVAS:63588", "title": "Mandrake Security Advisory MDVSA-2009:076 (avahi)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_076.nasl 6573 2017-07-06 13:10:50Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:076 (avahi)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A security vulnerability has been identified and fixed in avahi which\ncould allow remote attackers to cause a denial of service (network\nbandwidth and CPU consumption) via a crafted legacy unicast mDNS\nquery packet (CVE-2009-0758).\n\nThe updated packages have been patched to prevent this.\n\nAffected: 2008.0, 2008.1, 2009.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:076\";\ntag_summary = \"The remote host is missing an update to avahi\nannounced via advisory MDVSA-2009:076.\";\n\n \n\nif(description)\n{\n script_id(63588);\n script_version(\"$Revision: 6573 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:10:50 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0758\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:076 (avahi)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3-devel\", rpm:\"libavahi-client3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3-devel\", rpm:\"libavahi-common3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0-devel\", rpm:\"libavahi-compat-howl0-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1-devel\", rpm:\"libavahi-compat-libdns_sd1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5-devel\", rpm:\"libavahi-core5-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1-devel\", rpm:\"libavahi-glib1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1-devel\", rpm:\"libavahi-qt3_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1-devel\", rpm:\"libavahi-qt4_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1-devel\", rpm:\"libavahi-ui1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3-devel\", rpm:\"lib64avahi-client3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3-devel\", rpm:\"lib64avahi-common3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0-devel\", rpm:\"lib64avahi-compat-howl0-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1-devel\", rpm:\"lib64avahi-compat-libdns_sd1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5-devel\", rpm:\"lib64avahi-core5-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1-devel\", rpm:\"lib64avahi-glib1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1-devel\", rpm:\"lib64avahi-qt3_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1-devel\", rpm:\"lib64avahi-qt4_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1-devel\", rpm:\"lib64avahi-ui1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client-devel\", rpm:\"libavahi-client-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common-devel\", rpm:\"libavahi-common-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl-devel\", rpm:\"libavahi-compat-howl-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd-devel\", rpm:\"libavahi-compat-libdns_sd-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core-devel\", rpm:\"libavahi-core-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib-devel\", rpm:\"libavahi-glib-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject0\", rpm:\"libavahi-gobject0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject-devel\", rpm:\"libavahi-gobject-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3-devel\", rpm:\"libavahi-qt3-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4-devel\", rpm:\"libavahi-qt4-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui-devel\", rpm:\"libavahi-ui-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client-devel\", rpm:\"lib64avahi-client-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common-devel\", rpm:\"lib64avahi-common-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl-devel\", rpm:\"lib64avahi-compat-howl-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd-devel\", rpm:\"lib64avahi-compat-libdns_sd-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core-devel\", rpm:\"lib64avahi-core-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib-devel\", rpm:\"lib64avahi-glib-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject0\", rpm:\"lib64avahi-gobject0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject-devel\", rpm:\"lib64avahi-gobject-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3-devel\", rpm:\"lib64avahi-qt3-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4-devel\", rpm:\"lib64avahi-qt4-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui-devel\", rpm:\"lib64avahi-ui-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client-devel\", rpm:\"libavahi-client-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common-devel\", rpm:\"libavahi-common-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl-devel\", rpm:\"libavahi-compat-howl-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd-devel\", rpm:\"libavahi-compat-libdns_sd-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core-devel\", rpm:\"libavahi-core-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib-devel\", rpm:\"libavahi-glib-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject0\", rpm:\"libavahi-gobject0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject-devel\", rpm:\"libavahi-gobject-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3-devel\", rpm:\"libavahi-qt3-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4-devel\", rpm:\"libavahi-qt4-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui-devel\", rpm:\"libavahi-ui-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client-devel\", rpm:\"lib64avahi-client-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common-devel\", rpm:\"lib64avahi-common-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl-devel\", rpm:\"lib64avahi-compat-howl-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd-devel\", rpm:\"lib64avahi-compat-libdns_sd-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core-devel\", rpm:\"lib64avahi-core-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib-devel\", rpm:\"lib64avahi-glib-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject0\", rpm:\"lib64avahi-gobject0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject-devel\", rpm:\"lib64avahi-gobject-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3-devel\", rpm:\"lib64avahi-qt3-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4-devel\", rpm:\"lib64avahi-qt4-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui-devel\", rpm:\"lib64avahi-ui-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:12", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 200904-10.", "modified": "2017-07-07T00:00:00", "published": "2009-04-15T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=63804", "id": "OPENVAS:63804", "title": "Gentoo Security Advisory GLSA 200904-10 (avahi)", "type": "openvas", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An error in Avahi might lead to a Denial of Service via network and CPU\nconsumption.\";\ntag_solution = \"All Avahi users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-dns/avahi-0.6.24-r2'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-10\nhttp://bugs.gentoo.org/show_bug.cgi?id=260971\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200904-10.\";\n\n \n \n\nif(description)\n{\n script_id(63804);\n script_version(\"$Revision: 6595 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:19:55 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)\");\n script_cve_id(\"CVE-2009-0758\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Gentoo Security Advisory GLSA 200904-10 (avahi)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-dns/avahi\", unaffected: make_list(\"ge 0.6.24-r2\"), vulnerable: make_list(\"lt 0.6.24-r2\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:42", "bulletinFamily": "scanner", "description": "The remote host is missing updates announced in\nadvisory GLSA 200904-10.", "modified": "2018-04-06T00:00:00", "published": "2009-04-15T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063804", "id": "OPENVAS:136141256231063804", "title": "Gentoo Security Advisory GLSA 200904-10 (avahi)", "type": "openvas", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An error in Avahi might lead to a Denial of Service via network and CPU\nconsumption.\";\ntag_solution = \"All Avahi users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-dns/avahi-0.6.24-r2'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200904-10\nhttp://bugs.gentoo.org/show_bug.cgi?id=260971\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200904-10.\";\n\n \n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63804\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-15 22:11:00 +0200 (Wed, 15 Apr 2009)\");\n script_cve_id(\"CVE-2009-0758\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Gentoo Security Advisory GLSA 200904-10 (avahi)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-dns/avahi\", unaffected: make_list(\"ge 0.6.24-r2\"), vulnerable: make_list(\"lt 0.6.24-r2\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:43", "bulletinFamily": "scanner", "description": "The remote host is missing an update to avahi\nannounced via advisory MDVSA-2009:076.", "modified": "2018-04-06T00:00:00", "published": "2009-03-20T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063588", "id": "OPENVAS:136141256231063588", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:076 (avahi)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_076.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:076 (avahi)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A security vulnerability has been identified and fixed in avahi which\ncould allow remote attackers to cause a denial of service (network\nbandwidth and CPU consumption) via a crafted legacy unicast mDNS\nquery packet (CVE-2009-0758).\n\nThe updated packages have been patched to prevent this.\n\nAffected: 2008.0, 2008.1, 2009.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:076\";\ntag_summary = \"The remote host is missing an update to avahi\nannounced via advisory MDVSA-2009:076.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63588\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-20 00:52:38 +0100 (Fri, 20 Mar 2009)\");\n script_cve_id(\"CVE-2009-0758\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:076 (avahi)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3-devel\", rpm:\"libavahi-client3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3-devel\", rpm:\"libavahi-common3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0-devel\", rpm:\"libavahi-compat-howl0-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1-devel\", rpm:\"libavahi-compat-libdns_sd1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5-devel\", rpm:\"libavahi-core5-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1-devel\", rpm:\"libavahi-glib1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1-devel\", rpm:\"libavahi-qt3_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1-devel\", rpm:\"libavahi-qt4_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1-devel\", rpm:\"libavahi-ui1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3-devel\", rpm:\"lib64avahi-client3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3-devel\", rpm:\"lib64avahi-common3-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0-devel\", rpm:\"lib64avahi-compat-howl0-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1-devel\", rpm:\"lib64avahi-compat-libdns_sd1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5-devel\", rpm:\"lib64avahi-core5-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1-devel\", rpm:\"lib64avahi-glib1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1-devel\", rpm:\"lib64avahi-qt3_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1-devel\", rpm:\"lib64avahi-qt4_1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1-devel\", rpm:\"lib64avahi-ui1-devel~0.6.21~2.2mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client-devel\", rpm:\"libavahi-client-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common-devel\", rpm:\"libavahi-common-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl-devel\", rpm:\"libavahi-compat-howl-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd-devel\", rpm:\"libavahi-compat-libdns_sd-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core-devel\", rpm:\"libavahi-core-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib-devel\", rpm:\"libavahi-glib-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject0\", rpm:\"libavahi-gobject0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject-devel\", rpm:\"libavahi-gobject-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3-devel\", rpm:\"libavahi-qt3-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4-devel\", rpm:\"libavahi-qt4-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui-devel\", rpm:\"libavahi-ui-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client-devel\", rpm:\"lib64avahi-client-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common-devel\", rpm:\"lib64avahi-common-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl-devel\", rpm:\"lib64avahi-compat-howl-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd-devel\", rpm:\"lib64avahi-compat-libdns_sd-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core-devel\", rpm:\"lib64avahi-core-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib-devel\", rpm:\"lib64avahi-glib-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject0\", rpm:\"lib64avahi-gobject0~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject-devel\", rpm:\"lib64avahi-gobject-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3-devel\", rpm:\"lib64avahi-qt3-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4-devel\", rpm:\"lib64avahi-qt4-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui-devel\", rpm:\"lib64avahi-ui-devel~0.6.22~3.2mdv2008.1\", rls:\"MNDK_2008.1\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-dnsconfd\", rpm:\"avahi-dnsconfd~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-python\", rpm:\"avahi-python~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp\", rpm:\"avahi-sharp~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-sharp-doc\", rpm:\"avahi-sharp-doc~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"avahi-x11\", rpm:\"avahi-x11~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client3\", rpm:\"libavahi-client3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-client-devel\", rpm:\"libavahi-client-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common3\", rpm:\"libavahi-common3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-common-devel\", rpm:\"libavahi-common-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl0\", rpm:\"libavahi-compat-howl0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-howl-devel\", rpm:\"libavahi-compat-howl-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd1\", rpm:\"libavahi-compat-libdns_sd1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-compat-libdns_sd-devel\", rpm:\"libavahi-compat-libdns_sd-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core5\", rpm:\"libavahi-core5~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-core-devel\", rpm:\"libavahi-core-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib1\", rpm:\"libavahi-glib1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-glib-devel\", rpm:\"libavahi-glib-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject0\", rpm:\"libavahi-gobject0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-gobject-devel\", rpm:\"libavahi-gobject-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3_1\", rpm:\"libavahi-qt3_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt3-devel\", rpm:\"libavahi-qt3-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4_1\", rpm:\"libavahi-qt4_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-qt4-devel\", rpm:\"libavahi-qt4-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui1\", rpm:\"libavahi-ui1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"libavahi-ui-devel\", rpm:\"libavahi-ui-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client3\", rpm:\"lib64avahi-client3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-client-devel\", rpm:\"lib64avahi-client-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common3\", rpm:\"lib64avahi-common3~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-common-devel\", rpm:\"lib64avahi-common-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl0\", rpm:\"lib64avahi-compat-howl0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-howl-devel\", rpm:\"lib64avahi-compat-howl-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd1\", rpm:\"lib64avahi-compat-libdns_sd1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-compat-libdns_sd-devel\", rpm:\"lib64avahi-compat-libdns_sd-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core5\", rpm:\"lib64avahi-core5~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-core-devel\", rpm:\"lib64avahi-core-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib1\", rpm:\"lib64avahi-glib1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-glib-devel\", rpm:\"lib64avahi-glib-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject0\", rpm:\"lib64avahi-gobject0~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-gobject-devel\", rpm:\"lib64avahi-gobject-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3_1\", rpm:\"lib64avahi-qt3_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt3-devel\", rpm:\"lib64avahi-qt3-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4_1\", rpm:\"lib64avahi-qt4_1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-qt4-devel\", rpm:\"lib64avahi-qt4-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui1\", rpm:\"lib64avahi-ui1~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"lib64avahi-ui-devel\", rpm:\"lib64avahi-ui-devel~0.6.23~1.2mdv2009.0\", rls:\"MNDK_2009.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-02T00:03:28", "bulletinFamily": "scanner", "description": "Check for the Version of avahi", "modified": "2018-04-06T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:1361412562310880614", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880614", "title": "CentOS Update for avahi CESA-2010:0528 centos5 i386", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for avahi CESA-2010:0528 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Avahi is an implementation of the DNS Service Discovery and Multicast DNS\n specifications for Zero Configuration Networking. It facilitates service\n discovery on a local network. Avahi and Avahi-aware applications allow you\n to plug your computer into a network and, with no configuration, view other\n people to chat with, view printers to print to, and find shared files on\n other computers.\n\n A flaw was found in the way the Avahi daemon (avahi-daemon) processed\n Multicast DNS (mDNS) packets with corrupted checksums. An attacker on the\n local network could use this flaw to cause avahi-daemon on a target system\n to exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)\n \n A flaw was found in the way avahi-daemon processed incoming unicast mDNS\n messages. If the mDNS reflector were enabled on a system, an attacker on\n the local network could send a specially-crafted unicast mDNS message to\n that system, resulting in its avahi-daemon flooding the network with a\n multicast packet storm, and consuming a large amount of CPU. Note: The mDNS\n reflector is disabled by default. (CVE-2009-0758)\n \n All users are advised to upgrade to these updated packages, which contain\n backported patches to correct these issues. After installing the update,\n avahi-daemon will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"avahi on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-July/016778.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880614\");\n script_version(\"$Revision: 9371 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:55:06 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0528\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_name(\"CentOS Update for avahi CESA-2010:0528 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of avahi\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl\", rpm:\"avahi-compat-howl~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl-devel\", rpm:\"avahi-compat-howl-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd\", rpm:\"avahi-compat-libdns_sd~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd-devel\", rpm:\"avahi-compat-libdns_sd-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-devel\", rpm:\"avahi-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib\", rpm:\"avahi-glib~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib-devel\", rpm:\"avahi-glib-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3\", rpm:\"avahi-qt3~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3-devel\", rpm:\"avahi-qt3-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-tools\", rpm:\"avahi-tools~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:55:42", "bulletinFamily": "scanner", "description": "Check for the Version of avahi", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=880614", "id": "OPENVAS:880614", "title": "CentOS Update for avahi CESA-2010:0528 centos5 i386", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for avahi CESA-2010:0528 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Avahi is an implementation of the DNS Service Discovery and Multicast DNS\n specifications for Zero Configuration Networking. It facilitates service\n discovery on a local network. Avahi and Avahi-aware applications allow you\n to plug your computer into a network and, with no configuration, view other\n people to chat with, view printers to print to, and find shared files on\n other computers.\n\n A flaw was found in the way the Avahi daemon (avahi-daemon) processed\n Multicast DNS (mDNS) packets with corrupted checksums. An attacker on the\n local network could use this flaw to cause avahi-daemon on a target system\n to exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)\n \n A flaw was found in the way avahi-daemon processed incoming unicast mDNS\n messages. If the mDNS reflector were enabled on a system, an attacker on\n the local network could send a specially-crafted unicast mDNS message to\n that system, resulting in its avahi-daemon flooding the network with a\n multicast packet storm, and consuming a large amount of CPU. Note: The mDNS\n reflector is disabled by default. (CVE-2009-0758)\n \n All users are advised to upgrade to these updated packages, which contain\n backported patches to correct these issues. After installing the update,\n avahi-daemon will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"avahi on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2010-July/016778.html\");\n script_id(880614);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"CESA\", value: \"2010:0528\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_name(\"CentOS Update for avahi CESA-2010:0528 centos5 i386\");\n\n script_summary(\"Check for the Version of avahi\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl\", rpm:\"avahi-compat-howl~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl-devel\", rpm:\"avahi-compat-howl-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd\", rpm:\"avahi-compat-libdns_sd~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd-devel\", rpm:\"avahi-compat-libdns_sd-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-devel\", rpm:\"avahi-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib\", rpm:\"avahi-glib~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib-devel\", rpm:\"avahi-glib-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3\", rpm:\"avahi-qt3~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3-devel\", rpm:\"avahi-qt3-devel~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-tools\", rpm:\"avahi-tools~0.6.16~9.el5_5\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-12-15T11:58:16", "bulletinFamily": "scanner", "description": "Check for the Version of avahi", "modified": "2017-12-15T00:00:00", "published": "2010-07-16T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=870289", "id": "OPENVAS:870289", "title": "RedHat Update for avahi RHSA-2010:0528-01", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for avahi RHSA-2010:0528-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Avahi is an implementation of the DNS Service Discovery and Multicast DNS\n specifications for Zero Configuration Networking. It facilitates service\n discovery on a local network. Avahi and Avahi-aware applications allow you\n to plug your computer into a network and, with no configuration, view other\n people to chat with, view printers to print to, and find shared files on\n other computers.\n\n A flaw was found in the way the Avahi daemon (avahi-daemon) processed\n Multicast DNS (mDNS) packets with corrupted checksums. An attacker on the\n local network could use this flaw to cause avahi-daemon on a target system\n to exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)\n \n A flaw was found in the way avahi-daemon processed incoming unicast mDNS\n messages. If the mDNS reflector were enabled on a system, an attacker on\n the local network could send a specially-crafted unicast mDNS message to\n that system, resulting in its avahi-daemon flooding the network with a\n multicast packet storm, and consuming a large amount of CPU. Note: The mDNS\n reflector is disabled by default. (CVE-2009-0758)\n \n All users are advised to upgrade to these updated packages, which contain\n backported patches to correct these issues. After installing the update,\n avahi-daemon will be restarted automatically.\";\n\ntag_affected = \"avahi on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2010-July/msg00006.html\");\n script_id(870289);\n script_version(\"$Revision: 8130 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-15 07:31:09 +0100 (Fri, 15 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-07-16 10:40:49 +0200 (Fri, 16 Jul 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"RHSA\", value: \"2010:0528-01\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_name(\"RedHat Update for avahi RHSA-2010:0528-01\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of avahi\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl\", rpm:\"avahi-compat-howl~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl-devel\", rpm:\"avahi-compat-howl-devel~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd\", rpm:\"avahi-compat-libdns_sd~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd-devel\", rpm:\"avahi-compat-libdns_sd-devel~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-debuginfo\", rpm:\"avahi-debuginfo~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-devel\", rpm:\"avahi-devel~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib\", rpm:\"avahi-glib~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-glib-devel\", rpm:\"avahi-glib-devel~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3\", rpm:\"avahi-qt3~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-qt3-devel\", rpm:\"avahi-qt3-devel~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"avahi-tools\", rpm:\"avahi-tools~0.6.16~9.el5_5\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-01-19T15:04:37", "bulletinFamily": "scanner", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-992-1", "modified": "2018-01-18T00:00:00", "published": "2010-10-01T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310840511", "id": "OPENVAS:1361412562310840511", "title": "Ubuntu Update for avahi vulnerabilities USN-992-1", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_992_1.nasl 8457 2018-01-18 07:58:32Z teissa $\n#\n# Ubuntu Update for avahi vulnerabilities USN-992-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that Avahi incorrectly handled certain mDNS query packets\n when the reflector feature is enabled, which is not the default\n configuration on Ubuntu. A remote attacker could send crafted mDNS queries\n and perform a denial of service on the server and on the network. This\n issue only affected Ubuntu 8.04 LTS and 9.04. (CVE-2009-0758)\n\n It was discovered that Avahi incorrectly handled mDNS packets with\n corrupted checksums. A remote attacker could send crafted mDNS packets and\n cause Avahi to crash, resulting in a denial of service. (CVE-2010-2244)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-992-1\";\ntag_affected = \"avahi vulnerabilities on Ubuntu 8.04 LTS ,\n Ubuntu 9.04 ,\n Ubuntu 9.10 ,\n Ubuntu 10.04 LTS\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-992-1/\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.840511\");\n script_version(\"$Revision: 8457 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-18 08:58:32 +0100 (Thu, 18 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-01 16:10:21 +0200 (Fri, 01 Oct 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_xref(name: \"USN\", value: \"992-1\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_name(\"Ubuntu Update for avahi vulnerabilities USN-992-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2010 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU9.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"avahi-autoipd\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-daemon\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dbg\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-utils\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client3\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-data\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd1\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core6\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib1\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject0\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-1\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-1\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui0\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dnsconfd\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-ui-utils\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl-dev\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl0\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-avahi\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-discover\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3-udeb\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core6-udeb\", ver:\"0.6.25-1ubuntu5.2\", rls:\"UBUNTU9.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU10.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"avahi-autoipd\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-daemon\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dbg\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-utils\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client3\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-data\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd1\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core6\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib1\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject0\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-1\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-1\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui0\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dnsconfd\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-ui-utils\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl-dev\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl0\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-avahi\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-discover\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3-udeb\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core6-udeb\", ver:\"0.6.25-1ubuntu6.1\", rls:\"UBUNTU10.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU9.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"avahi-autoipd\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-daemon\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dbg\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-utils\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client3\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-data\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd1\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core5\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib1\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject0\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-1\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-1\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui0\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dnsconfd\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-ui-utils\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl-dev\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl0\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-discover\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-avahi\", ver:\"0.6.23-4ubuntu4.1\", rls:\"UBUNTU9.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU8.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"avahi-autoipd\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-daemon\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dbg\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-utils\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-client3\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-data\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-common3\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-howl0\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd1\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-core5\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-glib1\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-gobject0\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-1\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt3-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-1\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-qt4-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui-dev\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libavahi-ui0\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-dnsconfd\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"python-avahi\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"avahi-discover\", ver:\"0.6.22-2ubuntu4.2\", rls:\"UBUNTU8.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-09-28T18:25:24", "bulletinFamily": "scanner", "description": "Oracle Linux Local Security Checks ELSA-2010-0528", "modified": "2018-09-28T00:00:00", "published": "2015-10-06T00:00:00", "id": "OPENVAS:1361412562310122345", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122345", "title": "Oracle Linux Local Check: ELSA-2010-0528", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2010-0528.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122345\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:17:13 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2010-0528\");\n script_tag(name:\"insight\", value:\"ELSA-2010-0528 - avahi security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2010-0528\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2010-0528.html\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"avahi\", rpm:\"avahi~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl\", rpm:\"avahi-compat-howl~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-compat-howl-devel\", rpm:\"avahi-compat-howl-devel~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd\", rpm:\"avahi-compat-libdns_sd~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-compat-libdns_sd-devel\", rpm:\"avahi-compat-libdns_sd-devel~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-devel\", rpm:\"avahi-devel~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-glib\", rpm:\"avahi-glib~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-glib-devel\", rpm:\"avahi-glib-devel~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-qt3\", rpm:\"avahi-qt3~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-qt3-devel\", rpm:\"avahi-qt3-devel~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"avahi-tools\", rpm:\"avahi-tools~0.6.16~9.el5_5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:19", "bulletinFamily": "scanner", "description": "The remote host is missing an update to avahi\nannounced via advisory DSA 2086-1.", "modified": "2017-07-07T00:00:00", "published": "2010-08-21T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=67842", "id": "OPENVAS:67842", "title": "Debian Security Advisory DSA 2086-1 (avahi)", "type": "openvas", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2086_1.nasl 6614 2017-07-07 12:09:12Z cfischer $\n# Description: Auto-generated from advisory DSA 2086-1 (avahi)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several vulnerabilities have been discovered in the Avahi mDNS/DNS-SD\ndaemon. The Common Vulnerabilities and Exposures project identifies\nthe following problems:\n\nCVE-2009-0758\n\nRob Leslie discovered a denial of service vulnerability in the\ncode used to reflect unicast mDNS traffic.\n\nCVE-2010-2244\n\nLudwig Nussel discovered a denial of service vulnerability in\nthe processing of malformed DNS packets.\n\nFor the stable distribution (lenny), this problem has been fixed in\nversion 0.6.23-3lenny2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.6.26-1.\n\nWe recommend that you upgrade your Avahi packages.\";\ntag_summary = \"The remote host is missing an update to avahi\nannounced via advisory DSA 2086-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202086-1\";\n\n\nif(description)\n{\n script_id(67842);\n script_version(\"$Revision: 6614 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:09:12 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-08-21 08:54:16 +0200 (Sat, 21 Aug 2010)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_cve_id(\"CVE-2009-0758\", \"CVE-2010-2244\");\n script_name(\"Debian Security Advisory DSA 2086-1 (avahi)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"python-avahi\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-discover\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-glib-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-daemon\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-gobject0\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-core-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-compat-howl-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-autoipd\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-client-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-dnsconfd\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-client3\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-ui-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-qt4-1\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-core5\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-ui0\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-ui-utils\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-dbg\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-qt3-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-compat-howl0\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-common3\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"avahi-utils\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-glib1\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-qt3-1\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-common-data\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-common-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-gobject-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-compat-libdnssd1\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libavahi-qt4-dev\", ver:\"0.6.23-3lenny2\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:29", "bulletinFamily": "software", "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n\r\n Mandriva Linux Security Advisory MDVSA-2009:076\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n\r\n Package : avahi\r\n Date : March 13, 2009\r\n Affected: 2008.0, 2008.1, 2009.0\r\n _______________________________________________________________________\r\n\r\n Problem Description:\r\n\r\n A security vulnerability has been identified and fixed in avahi which\r\n could allow remote attackers to cause a denial of service (network\r\n bandwidth and CPU consumption) via a crafted legacy unicast mDNS\r\n query packet (CVE-2009-0758).\r\n \r\n The updated packages have been patched to prevent this.\r\n _______________________________________________________________________\r\n\r\n References:\r\n\r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758\r\n _______________________________________________________________________\r\n\r\n Updated Packages:\r\n\r\n Mandriva Linux 2008.0:\r\n 5205e2f1267dfc93be550495716d9adf 2008.0/i586/avahi-0.6.21-2.2mdv2008.0.i586.rpm\r\n 0bc91513517f19f317bc7c256808a7b3 2008.0/i586/avahi-dnsconfd-0.6.21-2.2mdv2008.0.i586.rpm\r\n b60f539f97b336d8f71c62c9d891e7dc 2008.0/i586/avahi-python-0.6.21-2.2mdv2008.0.i586.rpm\r\n 50aab3d5a45d369188c8cd9f46469bc7 2008.0/i586/avahi-sharp-0.6.21-2.2mdv2008.0.i586.rpm\r\n 95369eb5adb1c4c25c35363d8bdc1d99 2008.0/i586/avahi-sharp-doc-0.6.21-2.2mdv2008.0.i586.rpm\r\n 0d9fe1b65ee096a7bf1d723bc74b3cc4 2008.0/i586/avahi-x11-0.6.21-2.2mdv2008.0.i586.rpm\r\n 7e5c387dc301fd3eca3fd84a509ff0a2 2008.0/i586/libavahi-client3-0.6.21-2.2mdv2008.0.i586.rpm\r\n b74a746dcb2ae483424c1a9c07c7a14e 2008.0/i586/libavahi-client3-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 7e68502ace6b790b68cdbab7b42af36e 2008.0/i586/libavahi-common3-0.6.21-2.2mdv2008.0.i586.rpm\r\n dd35f908c7b403b080eae970722d1942 2008.0/i586/libavahi-common3-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 3f4169589e733dc19e7bf43acc897efc 2008.0/i586/libavahi-compat-howl0-0.6.21-2.2mdv2008.0.i586.rpm\r\n 3bf0137fa6afc4f65f930e9d2f636289 2008.0/i586/libavahi-compat-howl0-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n d630f48722a65eb014bcd7dc3655ef7f 2008.0/i586/libavahi-compat-libdns_sd1-0.6.21-2.2mdv2008.0.i586.rpm\r\n f1ec2a341e563638695e8ff84fed338f 2008.0/i586/libavahi-compat-libdns_sd1-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 746e7cecd2cab512c8593eacb83e42be 2008.0/i586/libavahi-core5-0.6.21-2.2mdv2008.0.i586.rpm\r\n 5ae1f68b59485d44d0ac0a5c15fdd412 2008.0/i586/libavahi-core5-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 5bde081cf8591b1e04521fda636aa8f5 2008.0/i586/libavahi-glib1-0.6.21-2.2mdv2008.0.i586.rpm\r\n 1a86f52499d6b4b7f4647106030cfcb6 2008.0/i586/libavahi-glib1-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n f75e85f8b019dcb7aadd586e8f1af88b 2008.0/i586/libavahi-qt3_1-0.6.21-2.2mdv2008.0.i586.rpm\r\n ed38c48bf5730f0c2b95aa88ca31b9ec 2008.0/i586/libavahi-qt3_1-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 83062b0293e8b01b3908346a4f2d677a 2008.0/i586/libavahi-qt4_1-0.6.21-2.2mdv2008.0.i586.rpm\r\n 12ed444c027b65b0108beaa94404e7a6 2008.0/i586/libavahi-qt4_1-devel-0.6.21-2.2mdv2008.0.i586.rpm\r\n 7aa697d582147e340e0322ed1089ad3a 2008.0/i586/libavahi-ui1-0.6.21-2.2mdv2008.0.i586.rpm\r\n 75f22835dde702324d57cb0263b0265f 2008.0/i586/libavahi-ui1-devel-0.6.21-2.2mdv2008.0.i586.rpm \r\n f14f874b93c2be4281a9631cff1007f3 2008.0/SRPMS/avahi-0.6.21-2.2mdv2008.0.src.rpm\r\n\r\n Mandriva Linux 2008.0/X86_64:\r\n 53f098c2c36a2ed76c419df38a127d51 2008.0/x86_64/avahi-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 44a83024e5c071d30955a968ee87627e 2008.0/x86_64/avahi-dnsconfd-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 6d47a859710d13f6f135144955575830 2008.0/x86_64/avahi-python-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n d5e4e7f3e241cc7c9af190cdf7921aa4 2008.0/x86_64/avahi-sharp-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 3cd96ae45042d0e19bb9ec2edfba45c1 2008.0/x86_64/avahi-sharp-doc-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n bb7803289ea0df24c18208111b5e5267 2008.0/x86_64/avahi-x11-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n bc0bd1f16720b1e4f4e4f9cae4dffdcb 2008.0/x86_64/lib64avahi-client3-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n ecdc9375b700fab374be4d41d70e380f 2008.0/x86_64/lib64avahi-client3-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n e43fe61d02767b774675e1f010bff50c 2008.0/x86_64/lib64avahi-common3-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 002b967d86a3f85a62d5ed1c7642c536 2008.0/x86_64/lib64avahi-common3-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 0e22e635ceca81b33feac85742e193c8 2008.0/x86_64/lib64avahi-compat-howl0-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 70d5db33ed2bcd1d5a535f0c5d742870 2008.0/x86_64/lib64avahi-compat-howl0-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 5e10c5a4de9ce65658f2ee7272690ecf 2008.0/x86_64/lib64avahi-compat-libdns_sd1-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 74c780ec9b1d86949b356cae9929e10e 2008.0/x86_64/lib64avahi-compat-libdns_sd1-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 661aa2b09668e7a928ae387beb73bf8b 2008.0/x86_64/lib64avahi-core5-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n d671f765b1f91b147206816d98c3dade 2008.0/x86_64/lib64avahi-core5-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n e381edaa5e551e12cdf69b67940796ea 2008.0/x86_64/lib64avahi-glib1-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 1fb3043429d6a7bd1f4fb94c378f65b2 2008.0/x86_64/lib64avahi-glib1-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 7e186a52ebf3216542e4232822ed185e 2008.0/x86_64/lib64avahi-qt3_1-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 0d596685c7d27b4f6de8d1b908da61f9 2008.0/x86_64/lib64avahi-qt3_1-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 3474c1ee6dc82c6dfed2206c5a932d4c 2008.0/x86_64/lib64avahi-qt4_1-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n 2ca79cc88071d5917d4b6fa65d5b89e8 2008.0/x86_64/lib64avahi-qt4_1-devel-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n a98d7503adc07e0d10c763a1dc346f3a 2008.0/x86_64/lib64avahi-ui1-0.6.21-2.2mdv2008.0.x86_64.rpm\r\n b894fca164bcfe9ecb8cc3db55996699 2008.0/x86_64/lib64avahi-ui1-devel-0.6.21-2.2mdv2008.0.x86_64.rpm \r\n f14f874b93c2be4281a9631cff1007f3 2008.0/SRPMS/avahi-0.6.21-2.2mdv2008.0.src.rpm\r\n\r\n Mandriva Linux 2008.1:\r\n 4643e58445b8bd9b25c7877d663ce2cb 2008.1/i586/avahi-0.6.22-3.2mdv2008.1.i586.rpm\r\n 623117b66cdbf61f5669f47e959e3d05 2008.1/i586/avahi-dnsconfd-0.6.22-3.2mdv2008.1.i586.rpm\r\n fbe6c9321884f80ea3471498909c16f0 2008.1/i586/avahi-python-0.6.22-3.2mdv2008.1.i586.rpm\r\n fd380ad725c544bda865f0de005b5a8d 2008.1/i586/avahi-sharp-0.6.22-3.2mdv2008.1.i586.rpm\r\n 59afa6691d56fb7e53f46bf7dd1101c6 2008.1/i586/avahi-sharp-doc-0.6.22-3.2mdv2008.1.i586.rpm\r\n fe522aef1aec2c5321fe0b6761f193bb 2008.1/i586/avahi-x11-0.6.22-3.2mdv2008.1.i586.rpm\r\n bccfb7087db0e2be93083bbf2744fb00 2008.1/i586/libavahi-client3-0.6.22-3.2mdv2008.1.i586.rpm\r\n 685f324a9cb97b605b95a7ecdc61a0ba 2008.1/i586/libavahi-client-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n 3d61ebd691ac8cbc29ce63417dbcdf14 2008.1/i586/libavahi-common3-0.6.22-3.2mdv2008.1.i586.rpm\r\n 79f1abcb2ab5cdde1b6c573ceed90274 2008.1/i586/libavahi-common-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n f83e5c8c5f8d81d280f2a7957481c814 2008.1/i586/libavahi-compat-howl0-0.6.22-3.2mdv2008.1.i586.rpm\r\n bcfcf4fa690751d3c2344b6d66759393 2008.1/i586/libavahi-compat-howl-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n e317916e13b7e73a4c301b57c6da2565 2008.1/i586/libavahi-compat-libdns_sd1-0.6.22-3.2mdv2008.1.i586.rpm\r\n aade2c8da552d0920f5da65c7ba6803d 2008.1/i586/libavahi-compat-libdns_sd-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n 39a3d6d4beefab68ab3b0fef7e87cc1e 2008.1/i586/libavahi-core5-0.6.22-3.2mdv2008.1.i586.rpm\r\n 65258b777d3a7b59775e6504eb570f5b 2008.1/i586/libavahi-core-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n 298e732446b774ee31e35f2ec35f9e20 2008.1/i586/libavahi-glib1-0.6.22-3.2mdv2008.1.i586.rpm\r\n 75ec2369df816a1774faa21092dd74a6 2008.1/i586/libavahi-glib-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n afdfe63b6ba16f9187dac961d9561d22 2008.1/i586/libavahi-gobject0-0.6.22-3.2mdv2008.1.i586.rpm\r\n 34e393cff5ac61fc5d3a3759d892497c 2008.1/i586/libavahi-gobject-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n b2b88bb1f9a5f2e8af94b5a9ec45f152 2008.1/i586/libavahi-qt3_1-0.6.22-3.2mdv2008.1.i586.rpm\r\n f8399ceae75bd28bae7bb503da199865 2008.1/i586/libavahi-qt3-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n 7debd38727f86660533c68d8aeba97db 2008.1/i586/libavahi-qt4_1-0.6.22-3.2mdv2008.1.i586.rpm\r\n a9992e3d94402ef5f0919b884747eac7 2008.1/i586/libavahi-qt4-devel-0.6.22-3.2mdv2008.1.i586.rpm\r\n edb9c6adee393e9fdfae1b1b1802d0e4 2008.1/i586/libavahi-ui1-0.6.22-3.2mdv2008.1.i586.rpm\r\n da53b62c5a66c4e972050316c29b49f9 2008.1/i586/libavahi-ui-devel-0.6.22-3.2mdv2008.1.i586.rpm \r\n 7cac568349b640d0316ffa7a5a075a05 2008.1/SRPMS/avahi-0.6.22-3.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2008.1/X86_64:\r\n caac6de9657b9d857baa1acb286d7e5f 2008.1/x86_64/avahi-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 2d0c1de2d93f8626d8f25cbbda7e5914 2008.1/x86_64/avahi-dnsconfd-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 567e1f3566873a2812fa13ad9b063f53 2008.1/x86_64/avahi-python-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 1c5ec967e6fad376240276b982bdac6c 2008.1/x86_64/avahi-sharp-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 1231820618892dc722347bd608575392 2008.1/x86_64/avahi-sharp-doc-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n ed207c0301bcdf711004d7a2f108d398 2008.1/x86_64/avahi-x11-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 963e96df14ac0cd5d1d5a174441beef1 2008.1/x86_64/lib64avahi-client3-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 24959d2cdcdf2777d2b7911192257794 2008.1/x86_64/lib64avahi-client-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 0081afdbd78a0f0523e50d774301ef5e 2008.1/x86_64/lib64avahi-common3-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 1aa1dbc71e32aa29be2ab7693e393bba 2008.1/x86_64/lib64avahi-common-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n f9dfe3f91125ec593d1648291398cced 2008.1/x86_64/lib64avahi-compat-howl0-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 0a2e7610a600dd15159ee548459fb531 2008.1/x86_64/lib64avahi-compat-howl-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n d55f1129b1838c320aa032150796851c 2008.1/x86_64/lib64avahi-compat-libdns_sd1-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n be913e81876493c3e2ed32f44fc8ed2a 2008.1/x86_64/lib64avahi-compat-libdns_sd-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n f0f659e0e2cde2328888a81c220469d0 2008.1/x86_64/lib64avahi-core5-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 4cc0fa443b22b121e71ef73776b63a08 2008.1/x86_64/lib64avahi-core-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 1015e8f7a0f34af86dcc0e0fc4096247 2008.1/x86_64/lib64avahi-glib1-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 697a542544e90e39e6b95ad493182392 2008.1/x86_64/lib64avahi-glib-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n a8606482ed1630b68eee1e831c593809 2008.1/x86_64/lib64avahi-gobject0-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 39a8c2c32f58fd8a76881d7a8225ecea 2008.1/x86_64/lib64avahi-gobject-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n f08ed3a6b14f9610fb14114e960249ea 2008.1/x86_64/lib64avahi-qt3_1-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 8d6dd599573c548ac07932372b8892cc 2008.1/x86_64/lib64avahi-qt3-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 5f4cb20a8182b49abe6ade119f6a8a02 2008.1/x86_64/lib64avahi-qt4_1-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 04ca53716e9bc1343533106ae612aa13 2008.1/x86_64/lib64avahi-qt4-devel-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 932c44e1fe1ae3c146cf037f85632ad6 2008.1/x86_64/lib64avahi-ui1-0.6.22-3.2mdv2008.1.x86_64.rpm\r\n 8ece3e3909e35e1b5ad1bca71f5cf699 2008.1/x86_64/lib64avahi-ui-devel-0.6.22-3.2mdv2008.1.x86_64.rpm \r\n 7cac568349b640d0316ffa7a5a075a05 2008.1/SRPMS/avahi-0.6.22-3.2mdv2008.1.src.rpm\r\n\r\n Mandriva Linux 2009.0:\r\n 0922abdb67df176f50ed00cb8d60a5cd 2009.0/i586/avahi-0.6.23-1.2mdv2009.0.i586.rpm\r\n 87daca2368c5d296d73d923369c4d266 2009.0/i586/avahi-dnsconfd-0.6.23-1.2mdv2009.0.i586.rpm\r\n fc1fb890554e738cc223f317a337e305 2009.0/i586/avahi-python-0.6.23-1.2mdv2009.0.i586.rpm\r\n 2525a3218502b022233440f9a4c1c12b 2009.0/i586/avahi-sharp-0.6.23-1.2mdv2009.0.i586.rpm\r\n 1f9f557881ad8084adc6f070378a3419 2009.0/i586/avahi-sharp-doc-0.6.23-1.2mdv2009.0.i586.rpm\r\n dc137d267cee2aac767f47c9de4054e9 2009.0/i586/avahi-x11-0.6.23-1.2mdv2009.0.i586.rpm\r\n ccbb379fc640c648a73fb1e270f05516 2009.0/i586/libavahi-client3-0.6.23-1.2mdv2009.0.i586.rpm\r\n ee57abd6b2535162556db2a0ad016299 2009.0/i586/libavahi-client-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 039f3d11880ff238010c598102226502 2009.0/i586/libavahi-common3-0.6.23-1.2mdv2009.0.i586.rpm\r\n 77e28398ef4a346edd10a038e92f1b66 2009.0/i586/libavahi-common-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n a76aed577049e44e696ac198a9a5d2a9 2009.0/i586/libavahi-compat-howl0-0.6.23-1.2mdv2009.0.i586.rpm\r\n 94a252bcc35b3c856eaa6d85dfce522d 2009.0/i586/libavahi-compat-howl-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 02c840a7fbce6459b5a5701b78550329 2009.0/i586/libavahi-compat-libdns_sd1-0.6.23-1.2mdv2009.0.i586.rpm\r\n 76a2cb4f70afdfb93f2c0f45c8de0261 2009.0/i586/libavahi-compat-libdns_sd-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n d7218e7654abb4fb74b98d665de2b8cf 2009.0/i586/libavahi-core5-0.6.23-1.2mdv2009.0.i586.rpm\r\n 7a32db9fc49ce2279c04bd723e4715af 2009.0/i586/libavahi-core-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 8af22c63829c72a819bb1d943a75ff07 2009.0/i586/libavahi-glib1-0.6.23-1.2mdv2009.0.i586.rpm\r\n 9c145ffa014ba0a78c4a4b828d75a8c0 2009.0/i586/libavahi-glib-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n f17a7174aba6de19c7814cda9a44a2a1 2009.0/i586/libavahi-gobject0-0.6.23-1.2mdv2009.0.i586.rpm\r\n efad68cba4a152993ec4e00f6ad8783a 2009.0/i586/libavahi-gobject-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 171f3f38ba4a2920c2f920ae3d27d200 2009.0/i586/libavahi-qt3_1-0.6.23-1.2mdv2009.0.i586.rpm\r\n e5e7610525aeb62d11f77f6e61b05750 2009.0/i586/libavahi-qt3-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 0fd1e782db973a3a0be042782c4b9aa0 2009.0/i586/libavahi-qt4_1-0.6.23-1.2mdv2009.0.i586.rpm\r\n 064208a2bc35485c55327123890e6fdf 2009.0/i586/libavahi-qt4-devel-0.6.23-1.2mdv2009.0.i586.rpm\r\n 659120073be047330d9c1335ab95fcf2 2009.0/i586/libavahi-ui1-0.6.23-1.2mdv2009.0.i586.rpm\r\n 09604bc1b5a29ae79806e5851bce612d 2009.0/i586/libavahi-ui-devel-0.6.23-1.2mdv2009.0.i586.rpm \r\n 99cb8a619b23ae9176353de16324aaf2 2009.0/SRPMS/avahi-0.6.23-1.2mdv2009.0.src.rpm\r\n\r\n Mandriva Linux 2009.0/X86_64:\r\n a86e6284f6874ff1d0c7f50d6af54eb8 2009.0/x86_64/avahi-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n eb6e4070280596bc811ece7c6ae6dcbb 2009.0/x86_64/avahi-dnsconfd-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n e71c5322a01b2684065f96961027efd3 2009.0/x86_64/avahi-python-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 676c53fc1d24ffe295b3a56d4735e22a 2009.0/x86_64/avahi-sharp-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 0a3077332885848053626513f936598b 2009.0/x86_64/avahi-sharp-doc-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n c960026057ff9a1a494d2a743967f68b 2009.0/x86_64/avahi-x11-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 32ac33ab25e4766db875991aa61d0f20 2009.0/x86_64/lib64avahi-client3-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 654da5e1594e665991c319236e9b2794 2009.0/x86_64/lib64avahi-client-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 156d1de7af1e8b881c8524b92179129f 2009.0/x86_64/lib64avahi-common3-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n a2aba395c7a8a6cd86f96cb6bbc81a07 2009.0/x86_64/lib64avahi-common-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 579093056cde1433a0c92aac7880adc4 2009.0/x86_64/lib64avahi-compat-howl0-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 59425a8fa36893f69d22ebf49ad69c81 2009.0/x86_64/lib64avahi-compat-howl-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 0e1675c157360a97e0243fb08887a8ce 2009.0/x86_64/lib64avahi-compat-libdns_sd1-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n d445c9cde9f0621fcda83b225ef244f1 2009.0/x86_64/lib64avahi-compat-libdns_sd-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 48fcde813d4b418262bbba0d3b004216 2009.0/x86_64/lib64avahi-core5-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n bc96a7e82a8a11fb96de61469d9157e3 2009.0/x86_64/lib64avahi-core-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n d015079b71e5fc6fb24e9f01919057e5 2009.0/x86_64/lib64avahi-glib1-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n cf3e3265670e41479de3f6130a70a77f 2009.0/x86_64/lib64avahi-glib-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 8aa3a0a5c6e8dc05ce3936198536939a 2009.0/x86_64/lib64avahi-gobject0-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 8e0e9a6fd97c02f642e8ee7bea66436a 2009.0/x86_64/lib64avahi-gobject-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 2e154f04b36a974da3c981422810dee4 2009.0/x86_64/lib64avahi-qt3_1-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 84d48f0d2280d3303023752e0d58d177 2009.0/x86_64/lib64avahi-qt3-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 9ad4370d218b30e28a68e780d2fba369 2009.0/x86_64/lib64avahi-qt4_1-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 982a9b6969b05e6c20fa3a878cf7ff63 2009.0/x86_64/lib64avahi-qt4-devel-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 15e9e044b09ea0192c5a61fd994dc6a4 2009.0/x86_64/lib64avahi-ui1-0.6.23-1.2mdv2009.0.x86_64.rpm\r\n 092a815f9d88d8606c8ff5cef47d031a 2009.0/x86_64/lib64avahi-ui-devel-0.6.23-1.2mdv2009.0.x86_64.rpm \r\n 99cb8a619b23ae9176353de16324aaf2 2009.0/SRPMS/avahi-0.6.23-1.2mdv2009.0.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.9 (GNU/Linux)\r\n\r\niD8DBQFJuuM+mqjQ0CJFipgRArpNAJ4uIaaZ+q8URII3XOt5PyfzG63LtACfbozE\r\nvnYJzr3bZd2cLFDcw3VkCI8=\r\n=8hK0\r\n-----END PGP SIGNATURE-----", "modified": "2009-03-17T00:00:00", "published": "2009-03-17T00:00:00", "id": "SECURITYVULNS:DOC:21492", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:21492", "title": "[ MDVSA-2009:076 ] avahi", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:36", "bulletinFamily": "software", "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n- ------------------------------------------------------------------------\r\nDebian Security Advisory DSA-2086-1 security@debian.org\r\nhttp://www.debian.org/security/ Moritz Muehlenhoff\r\nAugust 04, 2010 http://www.debian.org/security/faq\r\n- ------------------------------------------------------------------------\r\n\r\nPackage : avahi\r\nVulnerability : several\r\nProblem type : remote\r\nDebian-specific: no\r\nCVE Id(s) : CVE-2009-0758 CVE-2010-2244\r\n\r\nSeveral vulnerabilities have been discovered in the Avahi mDNS/DNS-SD\r\ndaemon. The Common Vulnerabilities and Exposures project identifies\r\nthe following problems:\r\n\r\nCVE-2009-0758\r\n\r\n Rob Leslie discovered a denial of service vulnerability in the\r\n code used to reflect unicast mDNS traffic.\r\n\r\nCVE-2010-2244\r\n\r\n Ludwig Nussel discovered a denial of service vulnerability in\r\n the processing of malformed DNS packets.\r\n\r\nFor the stable distribution (lenny), this problem has been fixed in \r\nversion 0.6.23-3lenny2.\r\n\r\nFor the unstable distribution (sid), these problems have been fixed in\r\nversion 0.6.26-1.\r\n\r\nWe recommend that you upgrade your Avahi packages.\r\n\r\n\r\nUpgrade instructions\r\n- --------------------\r\n\r\nwget url\r\n will fetch the file for you\r\ndpkg -i file.deb\r\n will install the referenced file.\r\n\r\nIf you are using the apt-get package manager, use the line for\r\nsources.list as given below:\r\n\r\napt-get update\r\n will update the internal database\r\napt-get upgrade\r\n will install corrected packages\r\n\r\nYou may use an automated update by adding the resources from the\r\nfooter to the proper configuration.\r\n\r\n\r\nDebian GNU/Linux 5.0 alias lenny\r\n- --------------------------------\r\n\r\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\r\n\r\nSource archives:\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23.orig.tar.gz\r\n Size/MD5 checksum: 1104410 aab1a304851d8145ea5f6a85c10af9e9\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23-3lenny2.diff.gz\r\n Size/MD5 checksum: 30974 f61a700480e9a26d91076923a5f07e4d\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23-3lenny2.dsc\r\n Size/MD5 checksum: 2319 e0e18cae129c74514565cd120b15acb2\r\n\r\nArchitecture independent packages:\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/python-avahi_0.6.23-3lenny2_all.deb\r\n Size/MD5 checksum: 29456 b94b301976fa60d9b602f7a966500a9f\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-discover_0.6.23-3lenny2_all.deb\r\n Size/MD5 checksum: 36672 dc16c7988c893da9213b9ebb62ead46e\r\n\r\nalpha architecture (DEC Alpha)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 35324 e16e057a8c198560d1afbf16425a7b0e\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 89922 c8f116727b706a4048f253ff8d791f33\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 44908 3f331f1f9ebbf3a7c1da2c89e235fc0f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 201096 eb5b6738fa319bfdb74a0f503e73f796\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 71408 b2dbc376d1479d774764adab430fc2c5\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 49934 2433df969a6fab9fd24107baf8f82135\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 78288 9389d8cb4787ddc03b84b0a55be4625a\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 39082 d1876ded6eec7250cfc2bc5318ba377d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 53036 961fa9f3a1042f5d56cd456ad62fa7d4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 58068 647aeb444433b11c28e1c5dbefd2d538\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 32326 d21a20c31bfa23f68e36ab25c7290efc\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 118384 43ba606a86d307659e2c251c3fba2938\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 47008 c403266b42dd288111313d7c8b5c7d76\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 34278 45864830230e0b9ef9e702fcf5e4404b\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 686554 57f463151e13887c421151f2e4b2609c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 36842 14c4a1f37301287cb1411d237571e1f9\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 66672 130f052d086d322fad1711f9fefe3ac6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 50140 5c56cf826e1e8e68cadaa21348f76959\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 49160 38cb361f83981cc967c35e8f222e7b5d\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 53306 21efdaa7fcb87af43f931a1892edd659\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 32380 ea0b7ebe07a9f4c71f2092b93e296b50\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 34314 8557d40c366f247dd726280e43485773\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 32036 9c312b838cfc3da506ba4533b0633992\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 75194 529c1ae0403c2d5ff2f6a91c57d86cbc\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 58374 db411fafb34d1d115a0fbe10f4b54f25\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 41766 7e137a1bd321f061ebfd872ceedd9c0c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_alpha.deb\r\n Size/MD5 checksum: 34380 939e253c6e3d12753d7bc319f6fe3b3f\r\n\r\namd64 architecture (AMD x86_64 (AMD64))\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 62824 286d7f9cb789a60b85c8dc7755b99b5c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 51292 2913b7cc7ba86baf59eaa388198259cf\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 33960 f1577615f2ac27fb2f50d00733bbe32f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 32024 4efdbcfbb9bb24919e1e9c44f6a3c736\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 48496 7be648f50343dd836691582763007a9f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 34688 1101fe277caba6ff617cfb36268ab593\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 53690 4bda754290278d734b592eb38cf674f8\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 47324 ddbcb2272a71ee13d93990daa18f2cdb\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 49810 e13ed569863f98da2fa1eadcc8e79c82\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 31290 a738ab55b39ce0dc55178ce698ad95a0\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 688782 c17fd4bab869df2a5120a138fbc7ce6c\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 39280 98825137064de14307e60fd7d63f1243\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 42618 150ea460ab73f35d8cc83be1647f0af0\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 162492 4e0dd7831cb9120e45af93e81cab3df6\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 49442 c6051f3d2f84ddff7188c4128070f176\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 55008 03df8348b0a77efd6c13fcabbef1cb9e\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 44918 41161d5e45b5bc878e5e0c59e3706f78\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 34054 526988eb85d56ede9c7cb4cdfa4f9c3b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 61418 d27cea4086150807106a9e741b567dfb\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 69336 64063da1529853b1a5cc382f0ee53eb2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 50144 dcf828721c4856610187dec5fa81c96f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 64240 12d8b242bad3243fe8ffda96c7d1dbf6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 32888 46a155ac4caad0ac07fb657cad06471c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 123924 cd832445e521d94efa68156647841c19\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 91924 24f4f6530ba4c2b54cea91e9e2d4d071\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 32588 141beb9f8fa9b79066714919b3fbcd9a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_amd64.deb\r\n Size/MD5 checksum: 34102 afda7cc8d53b1c90e0fc4daf9f6cc314\r\n\r\narm architecture (ARM)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 146268 4da95135b8b59a6e19354a6e7bb10922\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 32468 fd999da2644cbd79f27134fb13acae90\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 33074 3b0797fe3fc16a737487a25c3c3e91ae\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 60900 d5f91fab7718e473a6d279f91d6586d1\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 45220 4ea09715bb0049355de9980c96d6ca5c\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 649280 3a473dd2581b00afb1595da17521a83b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 32728 70e54071d97d19115a2316bba82ae29c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 59788 72de2153ae551fe57ebf3e5a12dc094e\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 38542 7d544df5b8144ce4976205021e955d8f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 58644 854890b117dd2bf67b02dfd25e94d060\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 31628 3124bfc2a2ecbd0313a0052557a9f927\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 50276 445158172c49c5e1c47445c15cadfdb1\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 45880 9a923ded7cb8334c72d6c1df3d626178\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 41504 c0427441d5b73e2b2ae240c3628a50be\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 50334 5c14da488d7474d798a479b62342253b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 39488 1014532e6ad5e368fa890c9a68c991d0\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 65356 41497b5c96580ccf46fd0f3f0dc23e1b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 32106 fa20164b2afe4890446ea2e7327a631a\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 88674 d89a73a8b075328c6b94fe4b06da8074\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 34094 8e3097bf29e0f44289662e8f5ca34c90\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 108442 8c76784edae3799df600d427fcc07bdd\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 51182 040505e72ac42e8c5e09f52d8753e6e1\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 43162 6ca1f17072ad667ed16dd9e74c75c5a7\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 47166 069880955a40f7ec82e4746d613b2241\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 48780 661ac64a333f6a9e73e044db35e234bf\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 33270 838b8973e2288c193c02f2f3bd1ee1a4\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_arm.deb\r\n Size/MD5 checksum: 33306 518aa9706f6f9b891ab19b5b39739131\r\n\r\narmel architecture (ARM EABI)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 146830 9754f65b655e49683db642e622fe5159\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 61698 9b0d44f23bf82e53f1094e53afb83804\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 66458 38881c16c9335c3ac8256d82d6ae8939\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 652942 6974153f7039481d2c12a94545cc6887\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 46496 70e968ed3ff06318aaff4ad93e0fb153\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 50068 d3c326e96d8c0f2f1a0d2d16d5fac45b\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 51364 53fbfb9bb0c466f8876ed2a53029c6f4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 33662 8745caf1f81cf9a1b5b1e11ddaae00df\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 32152 2ea7172c2c6de9d5f65b35cd2efd7c12\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 88056 33d9ddb2fae393edec9d0fd0c076dd09\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 45100 0aa5ec5ef8dc747a9ed21538c2616e51\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 48764 04433b9318d188cf96aadee82ebc0120\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 34340 9fcafa9d44ca4614afe8eb5078951b12\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 33046 5036533a9149f15ca7abbce027605b31\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 49126 1b96741441a4456c0387a3a85a19c85e\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 60106 137e1a6a9d635ed0c775db45ce6f0320\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 110262 e4fefc8e629f6a025598a4ee1e6d40af\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 33578 8119b84742ad28955eab6d1e706d660d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 41478 335899d7061f91ce7dc7d7ac65846335\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 38590 bcf0207b3592ca64d4201bad74692075\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 60680 a2390ff9256357b918aa242e535c37ee\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 39976 b2382de4f508046ec65134dd664c87d4\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 51530 67cbabc40b519abb09fa49203909d302\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 43328 d84752eddda8bddfa0ac2d146f778b84\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 32782 d4faadf1cff80585b483bab9e7bb2d59\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 31662 9b21b2c45ee331783179668c057531eb\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_armel.deb\r\n Size/MD5 checksum: 33430 2089f4c6e62254387bbedc03d7bee749\r\n\r\ni386 architecture (Intel ia32)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 61784 0193328b68ce84d1b69f9948a05c470c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 151836 beba56aeb5bdfcca907f0e450ac57358\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 59638 f376df3d41a6932dd180c81e1c9e2c93\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 45780 24a63e377bb7a39b89b705abb7c4e49f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 46898 7ce11fa8172c958603a2c368541490d9\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 33734 02ecc47f299cd0cb274e738800cef828\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 38668 190ca5849ab2f3952fe2c8afb51f0d18\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 49112 d2edf6401432b1df355cec364e1f5d39\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 51112 5fbfa4a4e17b253a6c22984f3a5ab80c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 66730 0b02df8014b6e150fae27362f254f457\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 40668 77855d2a17058b4c347ab86017e0dd38\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 31304 d8415fdc9f47e2a3205e17f4c2939e98\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 115386 f56705a9517a6b2c8ca88b28bc4dc1ae\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 47048 f68efb5b48700051486b1d6282c7777f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 60120 f236ea42f40b9e573d51f5bcaeb06faf\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 31802 129bbdf9e21e748c3e36413a8d915511\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 33882 4da373a2af199135d3fda871971322ca\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 87894 84477c99412a5340258cdf5003a8dc8f\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 48752 e583ffc223b9ac5ab85fd0f78168a60a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 33880 d67dff0a7c953bf5fb520b469a269799\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 47960 bd55f44b793609bc64f5321d43e365aa\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 51996 cd4c93ba7e157fabca95f487ecbda23d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 32546 211c6f9d5391752511c12c5f1aea36e6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 32294 93a9e68ea067a8713a619a41c613dfdd\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 42180 022c289ca8a53fecdccf4832f419148b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 34180 95408de4a3026d76dc37ae91ca9a6e73\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_i386.deb\r\n Size/MD5 checksum: 650048 90338b8d89c29f3fd0147ebfbda1b321\r\n\r\nia64 architecture (Intel ia64)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 46468 72f737fae568cc1638c0921fb76cd83d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 33276 3a2da50e86383f43da4c740e2e8d2da5\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 620588 a26679722d3c309dde3aa0723c93fe3a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 55840 f746e9a61735819065922923bd23f56c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 56344 7c6e9be349abb079ffe2c37baf7ddfba\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 78652 04491f3d3192ddda6dc460034a4f35a4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 36000 e75883a7710233298996c76aa98042fe\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 77886 bfc76dd721d293f7a783283892fb06d0\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 61744 8cfa501d579973798fe617eed179f4dd\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 66300 2187a03a6c3f54dee41b8b178aa3b5c6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 54288 7a5c20d042ffd9e7b0224f9e66cd5f91\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 55964 3361738d3b8a05b2297f7999bbe99057\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 35566 6ccc6a85e8b5f4c2ddd19c64e628c6e2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 36290 2c31848864283f6c914f4f8be19cf864\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 49542 fb9ca77224afcab70cd7f60945976cd5\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 109328 69a20ee280c7bf81bd82a09dde3f8f4a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 54240 95dcb3e83cada4446c044d7c4a717ce2\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 41126 24710a11bbe9be188afdafdf9a197c8f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 52872 f60a35654d213e4699e53e6d2c43bbc8\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 212814 c7a6113b35ff5aa8f693cd00aa43bca6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 34590 6799fcb147ce6fc4da94c3a45695c9b7\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 34034 2178594182d832a6a04ebb6eaed1e523\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 70292 939c0de47112b50c3b362289ca343a3d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 62870 5f187881aad88473561dcb058aaabdec\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 35384 eb3ed802747d622e3d8b2898955c41af\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 32134 9af8b78bb80480e39a49bfb990f50251\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_ia64.deb\r\n Size/MD5 checksum: 153522 8b3019b9bab2620b7985d94caab85f0f\r\n\r\nmips architecture (MIPS (Big Endian))\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 35420 5f83324460244091a74b23dcf42dda22\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 34166 46a530124395bfe5165549a3e221a070\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 33768 c65b56ce14a22789cc9a058224d32743\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 49498 11e77f12c8bb0ee6a438a727b0cb40c8\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 33958 78cbaa9adcd18d0f2561f71f93b0d232\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 64864 0dd8dac0a0c99097dbfca1ca46c0439c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 42302 dcbef3b103d05256f8835707147b6f85\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 33438 19d705f37379e043c06d2355c1b5973a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 65760 5493867c0dbef8a69a5a296d6c1ac27c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 46090 af56c8a7a06d6ab14b8cb47e96bf87f9\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 69874 5fb0787218374eac8fde46e99dd22d09\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 685890 9dafe3ccc5dd08d391da67bba586d1e5\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 31456 c55b47128bb3300274bf6b8641f83aad\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 44538 740b5f6e8d280027e915e366f8a700d3\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 32918 7a393d8c88b06a61ea6ec6376c4a2de0\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 50428 2be67db1e5f758c88ade3bc4e207c377\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 49396 6aa53f0fd0edde2f7cd8d7f4f883bc67\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 62514 29387c0071aa5f1f5eddfe87e8722181\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 86534 203d772ff1d7aae5b0e749f7d657cd72\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 40338 e34ebad670c69563eabb1a769cf54a5f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 32190 3ad5fab540e38e68cf9944ca72589570\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 51320 0ddbe35ed48b87f58d0b26a9d9002e10\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 38660 e5cf54fe146833279f16fcecdee9d026\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 168170 02fd9c6e87daec043a9277ed23de35fa\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 47738 49491c48a5408cca370ed8fe92450836\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 106098 822908f6135360db9c26941483f6ae34\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_mips.deb\r\n Size/MD5 checksum: 51616 f7cdc78a36a0d2d750ac062277884f77\r\n\r\nmipsel architecture (MIPS (Little Endian))\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 38848 bdb3195b36155a2fb8fd90b83e139c27\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 40322 8f62f12b559483dbe7e3baf7f7065ded\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 35314 8eaf6dd2c17379fe00913e0374a43680\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 32802 f0c83ab6a42aed99eb5def924b9a90c7\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 62142 43110ab2eff15157089ef61ce1b011e8\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 49800 b21656c42215b3bee1ad38e6a6deaf48\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 42244 60f06b57aeab7f44ed73cd1ff6868acf\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 49604 6cdd0ee612d5bcd78e4ce7bdf04031b7\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 50710 bba1f80e92d70e1f93f1fafbd88e8860\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 33820 86008e7c8f43ed976a863cc8f0db242a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 44496 06a8d3fceb8cb7241a1fe281b2e14531\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 32110 b94f3df3bdb37c73276ebbb7ae08b2a2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 70056 2653003d1f9c318e982d57ad4f2815ea\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 31304 74695ccb3ad2a5dbaf3301f634afa1c9\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 66202 1000fa0b99af073e3bcfadf247a57381\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 106186 c3fcd394cdbb5fd9c82a4a7cb01d180c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 168582 5cb247dd9ba6af8fe44fcd42e4a472f1\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 86564 f0c61b7e97d8dc0aa068db0e3da78350\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 34426 714909abcb28bda06da7cd5175ad9149\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 52406 43b6984930670203708ce747ce58f746\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 65124 f283ebb3acafe43d8166c1a1ecc72d6b\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 51300 31de1bd7c7fcd30f9ef32ef7b9bb4238\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 33390 65cf3307296347500430cee802a403d3\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 676276 7bfc2baa7c17d34848284a19cd4c303f\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 33718 7fcf2d2ba94fa40349e8473d238e30a6\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 48012 598c06d80d4a5d22c3d89305c6410572\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_mipsel.deb\r\n Size/MD5 checksum: 46030 1bccbb466f21323eb237062c2405f4e0\r\n\r\npowerpc architecture (PowerPC)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 33364 7fc62cf40e620c0f6d0bb8fbd84a73c4\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 53232 9645da2340fe5f946807c0a1d7ec340d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 49430 b7b817699a46583c93e26f339f91b4d7\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 36708 c31f7b3452a6c637d092872a422660f2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 67026 cd9ece9eac67282798e397c00b4b31e4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 59912 f3f347bf36eff8bb2e4a0c0fe43abe15\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 35134 0087601ffc832588cdd3ec4648ea2e9e\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 60248 49fc4acfe70f4066e1529e25bd39809c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 52584 06e2abec7963a5aaaca40fdc1e5eb51a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 31442 76edb3ca5b02fe8bcf113d09f0d9efcc\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 35274 6f5e35df957f0266f569b778b7c8b159\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 46972 d6e72ffcd1408332e880efc51ab2899a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 61148 5a5b20b552b0a38752eb89bd72bd1656\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 93152 3d427c83479c86c6f450ffd92d61c9a0\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 41370 14202f794d7436ae4a4214161dd1d739\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 36366 6313ac62d2540c22bc5d6d3cd4cfbdce\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 145282 55d545c7989b66d47415b0fcd6a32475\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 33166 5ee7a20df60f435fe75500de7c15698c\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 43482 bf2dafa51d5522e7a3ee5c3d61c90ae4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 55666 9e7096d747b1cdc2a80c517c2485a8c4\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 48552 b1f16bf4dc7ce982e4a42ef5330439f0\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 44960 088a90cbcd607a5f5a7efe50a888d46d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 121248 49639aef4cb98e74b570d65722319ddc\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 690506 d7ab8de0afb4e8a0f432d2e316b9bdb5\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 59734 ed418aa04c908b438ddcd8feebab15cc\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 50624 22b5b2743fce2007c27a121f80501c00\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_powerpc.deb\r\n Size/MD5 checksum: 34598 b691ec01c7f3c250cafa9b0a57d8babe\r\n\r\ns390 architecture (IBM S/390)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 34128 0dd1e528cda0d2bedbdf1f4cefcb18d9\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 50226 f509f214cdfdd4f822441f9d02f1b1ff\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 44376 8c24af01bc395215f92240b4ee7a13df\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 93138 5cd7ce1b12e0b02d1c9885d026cb1532\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 47372 d7adc95ec07edcb6f909f4287de855f7\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 34522 bd95d35cc4d477f40742f11f32c658c7\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 34910 a0946f9bc0c1c5164e39f98d190fd753\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 39602 556e922edcf399815cad4396934f3174\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 669870 a3f50cf2fa37bdefa5ad4a6ac3707502\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 34196 49ccb68240428142f046d745e3cd0bdb\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 33114 8db81d073929528b6a5bb35e06d4a3c5\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 48544 bc208eb25816425bfd7b25c8e38791aa\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 63538 2c235d9348b7b72875b04907b6f2f821\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 33876 462991d65369c3048d4265b91cc8a674\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 53286 4ef24f66373df7cd6fa16eccf00665bc\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 54328 b67d6bdb1aafc0443d3ea8f72fc3b8e3\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 41924 d1f4c375b43262837fe09d50b1fcfb60\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 31814 ff80adab710778c736d25bdeb879e6cc\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 52366 896c2deec0fd03f9e1cd28f6d0530d63\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 64068 e1416f6a9fa9b8ffea8139d8213e9174\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 51610 aa17d20097011aeb54fabee978c1352d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 52544 186fc9c26543e492de639d6b78db7eec\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 69282 2044a1a9cdbd3c7d650f70f4f59556cd\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 32178 e005ad99f219075727d6e4e244bb63f3\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 157806 f9586e76160b8a7af3ee678d37c1ed73\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 122808 dbd4eaaf90b28cd8c2a0c607e8685285\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_s390.deb\r\n Size/MD5 checksum: 61214 810aaf3eeaf4668e89509aeaef93acad\r\n\r\nsparc architecture (Sun SPARC/UltraSPARC)\r\n\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 62956 265f55afb7d922d546932539a31af62f\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 38954 16d187a5606e181e8c44e7cba27cf703\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 51288 68e8f3c3498b7b612a0d8a7599b0b758\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 32162 6cd9d7f5de433036190728df3047c7be\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 33916 5ad604e33c1ee1825012653f1c2ef43a\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 48352 194c978e3963510af9e10083a9971065\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 34414 65a890bf6e57d4ac3f1d325ee51d6fd7\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 34154 8af251e0d9e0b1c7adcbcd5a9b69c474\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 112720 89e1a9fa715462d75a62090ce48aeaf2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 33360 cd820db5b258eb46d9d2e428b1b2c3cb\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 156152 a3c639b09c49a22d3b9c15c91249911b\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 48236 cb73d7952bf61526ba8d14c2d13d07a2\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 32638 1d7bde06b10fb66a92f2512de6014df3\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 49816 525386c13815cfa2bdc47c749412fc72\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 49194 cf16ec6463aede628f3040b1974f717e\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 32336 c9c95e0455873486f80b0a5465beb9cd\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 47674 48fcd958ed40077447a35c9c9281ed2d\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 608490 5fe0b3458222beb271daa3160dc91ce1\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 63162 c27eb7fe35020bfe3582a6934261e880\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 67822 db70861b1b2b78715b9a08c21fba91c3\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 52268 1c44465eed73ecd18811e52c24fc7f4e\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 42456 6d906cf3189ddcd4334c4e4fd5df458d\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 59872 26577d949ef29e1ed367074265bbc3d5\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 31660 95c6c3868ea426a5a404d1771a93f9ef\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 44766 32b4925fed06011c58efdf6a1dc3918f\r\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 40138 4817411a72f7591141d7ba3e3909caca\r\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_sparc.deb\r\n Size/MD5 checksum: 89338 0a1f27a2dcefd797bd3768339dcc30c8\r\n\r\n\r\n These files will probably be moved into the stable distribution on\r\n its next update.\r\n\r\n- ---------------------------------------------------------------------------------\r\nFor apt-get: deb http://security.debian.org/ stable/updates main\r\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\r\nMailing list: debian-security-announce@lists.debian.org\r\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.10 (GNU/Linux)\r\n\r\niEYEARECAAYFAkxY1JsACgkQXm3vHE4uylpkSACcD2PjYueoz/ONt4EyQ7kf/wyt\r\nz/8An25NmQTLQU8lIJ7N6GJ+zsruwbtj\r\n=btg1\r\n-----END PGP SIGNATURE-----", "modified": "2010-08-05T00:00:00", "published": "2010-08-05T00:00:00", "id": "SECURITYVULNS:DOC:24383", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24383", "title": "[SECURITY] [DSA 2086-1] New avahi packages fix denial of service", "type": "securityvulns", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:39", "bulletinFamily": "unix", "description": "### Background\n\nAvahi is a system that facilitates service discovery on a local network. \n\n### Description\n\nRob Leslie reported that the originates_from_local_legacy_unicast_socket() function in avahi-core/server.c does not account for the network byte order of a port number when processing incoming multicast packets, leading to a multicast packet storm. \n\n### Impact\n\nA remote attacker could send specially crafted legacy unicast mDNS query packets to the Avahi daemon, resulting in a Denial of Service due to network bandwidth and CPU consumption. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Avahi users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-dns/avahi-0.6.24-r2\"", "modified": "2009-04-08T00:00:00", "published": "2009-04-08T00:00:00", "id": "GLSA-200904-10", "href": "https://security.gentoo.org/glsa/200904-10", "type": "gentoo", "title": "Avahi: Denial of Service", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "redhat": [{"lastseen": "2018-12-11T17:40:55", "bulletinFamily": "unix", "description": "Avahi is an implementation of the DNS Service Discovery and Multicast DNS\nspecifications for Zero Configuration Networking. It facilitates service\ndiscovery on a local network. Avahi and Avahi-aware applications allow you\nto plug your computer into a network and, with no configuration, view other\npeople to chat with, view printers to print to, and find shared files on\nother computers.\n\nA flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on the\nlocal network could use this flaw to cause avahi-daemon on a target system\nto exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast mDNS\nmessages. If the mDNS reflector were enabled on a system, an attacker on\nthe local network could send a specially-crafted unicast mDNS message to\nthat system, resulting in its avahi-daemon flooding the network with a\nmulticast packet storm, and consuming a large amount of CPU. Note: The mDNS\nreflector is disabled by default. (CVE-2009-0758)\n\nAll users are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the update,\navahi-daemon will be restarted automatically.\n", "modified": "2017-09-08T12:19:18", "published": "2010-07-13T04:00:00", "id": "RHSA-2010:0528", "href": "https://access.redhat.com/errata/RHSA-2010:0528", "type": "redhat", "title": "(RHSA-2010:0528) Moderate: avahi security update", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2018-12-11T17:43:24", "bulletinFamily": "unix", "description": "The rhev-hypervisor package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: A subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nIt was found that the libspice component of QEMU-KVM on the host did not\nvalidate all pointers provided from a guest system's QXL graphics card\ndriver. A privileged guest user could use this flaw to cause the host to\ndereference an invalid pointer, causing the guest to crash (denial of\nservice) or, possibly, resulting in the privileged guest user escalating\ntheir privileges on the host. (CVE-2010-0428)\n\nIt was found that the libspice component of QEMU-KVM on the host could be\nforced to perform certain memory management operations on memory addresses\ncontrolled by a guest. A privileged guest user could use this flaw to crash\nthe guest (denial of service) or, possibly, escalate their privileges on\nthe host. (CVE-2010-0429)\n\nIt was found that QEMU-KVM on the host did not validate all pointers\nprovided from a guest system's QXL graphics card driver. A privileged guest\nuser could use this flaw to cause the host to dereference an invalid\npointer, causing the guest to crash (denial of service) or, possibly,\nresulting in the privileged guest user escalating their privileges on the\nhost. (CVE-2010-0431)\n\nA flaw was found in QEMU-KVM, allowing the guest some control over the\nindex used to access the callback array during sub-page MMIO\ninitialization. A privileged guest user could use this flaw to crash the\nguest (denial of service) or, possibly, escalate their privileges on the\nhost. (CVE-2010-2784)\n\nA NULL pointer dereference flaw was found when Red Hat Enterprise\nVirtualization Hypervisor was run on a system that has a processor with the\nIntel VT-x extension enabled. A privileged guest user could use this flaw\nto trick the host into emulating a certain instruction, which could crash\nthe host (denial of service). (CVE-2010-0435)\n\nA flaw was found in the way VDSM accepted SSL connections. An attacker\ncould trigger this flaw by creating a crafted SSL connection to VDSM,\npreventing VDSM from accepting SSL connections from other users.\n(CVE-2010-2811)\n\nThese updated packages provide updated components that include fixes for\nsecurity issues; however, these issues have no security impact for Red Hat\nEnterprise Virtualization Hypervisor. These fixes are for avahi issues\nCVE-2009-0758 and CVE-2010-2244; freetype issues CVE-2010-1797,\nCVE-2010-2498, CVE-2010-2499, CVE-2010-2500, CVE-2010-2519, CVE-2010-2527,\nand CVE-2010-2541; kernel issues CVE-2010-1084, CVE-2010-2066,\nCVE-2010-2070, CVE-2010-2226, CVE-2010-2248, CVE-2010-2521, and\nCVE-2010-2524; and openldap issues CVE-2010-0211 and CVE-2010-0212.\n\nThese updated rhev-hypervisor packages also fix two bugs. Documentation for\nthese bug fixes will be available shortly from\nhttp://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization_for_Servers/2.2/html/Technical_Notes/index.html\n\nAs Red Hat Enterprise Virtualization Hypervisor is based on KVM, the bug\nfixes from the KVM update RHSA-2010:0627 have been included in this update.\nAlso included are the bug fixes from the VDSM update RHSA-2010:0628.\n\nKVM: https://rhn.redhat.com/errata/RHSA-2010-0627.html\nVDSM: https://rhn.redhat.com/errata/RHSA-2010-0628.html\n\nUsers of Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to these updated rhev-hypervisor packages, which resolve these\nissues.\n", "modified": "2018-05-25T06:35:12", "published": "2010-08-19T04:00:00", "id": "RHSA-2010:0622", "href": "https://access.redhat.com/errata/RHSA-2010:0622", "type": "redhat", "title": "(RHSA-2010:0622) Important: rhev-hypervisor security and bug fix update", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "centos": [{"lastseen": "2017-10-03T18:25:52", "bulletinFamily": "unix", "description": "**CentOS Errata and Security Advisory** CESA-2010:0528\n\n\nAvahi is an implementation of the DNS Service Discovery and Multicast DNS\nspecifications for Zero Configuration Networking. It facilitates service\ndiscovery on a local network. Avahi and Avahi-aware applications allow you\nto plug your computer into a network and, with no configuration, view other\npeople to chat with, view printers to print to, and find shared files on\nother computers.\n\nA flaw was found in the way the Avahi daemon (avahi-daemon) processed\nMulticast DNS (mDNS) packets with corrupted checksums. An attacker on the\nlocal network could use this flaw to cause avahi-daemon on a target system\nto exit unexpectedly via specially-crafted mDNS packets. (CVE-2010-2244)\n\nA flaw was found in the way avahi-daemon processed incoming unicast mDNS\nmessages. If the mDNS reflector were enabled on a system, an attacker on\nthe local network could send a specially-crafted unicast mDNS message to\nthat system, resulting in its avahi-daemon flooding the network with a\nmulticast packet storm, and consuming a large amount of CPU. Note: The mDNS\nreflector is disabled by default. (CVE-2009-0758)\n\nAll users are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the update,\navahi-daemon will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2010-July/016777.html\nhttp://lists.centos.org/pipermail/centos-announce/2010-July/016778.html\n\n**Affected packages:**\navahi\navahi-compat-howl\navahi-compat-howl-devel\navahi-compat-libdns_sd\navahi-compat-libdns_sd-devel\navahi-devel\navahi-glib\navahi-glib-devel\navahi-qt3\navahi-qt3-devel\navahi-tools\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2010-0528.html", "modified": "2010-07-14T18:38:14", "published": "2010-07-14T18:38:14", "href": "http://lists.centos.org/pipermail/centos-announce/2010-July/016777.html", "id": "CESA-2010:0528", "title": "avahi security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "ubuntu": [{"lastseen": "2018-08-31T00:09:37", "bulletinFamily": "unix", "description": "It was discovered that Avahi incorrectly handled certain mDNS query packets when the reflector feature is enabled, which is not the default configuration on Ubuntu. A remote attacker could send crafted mDNS queries and perform a denial of service on the server and on the network. This issue only affected Ubuntu 8.04 LTS and 9.04. (CVE-2009-0758)\n\nIt was discovered that Avahi incorrectly handled mDNS packets with corrupted checksums. A remote attacker could send crafted mDNS packets and cause Avahi to crash, resulting in a denial of service. (CVE-2010-2244)", "modified": "2010-09-29T00:00:00", "published": "2010-09-29T00:00:00", "id": "USN-992-1", "href": "https://usn.ubuntu.com/992-1/", "title": "Avahi vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2018-08-31T01:39:07", "bulletinFamily": "unix", "description": "[0.6.16-9.el5]\n- Related: #609318 \n- Fixes CVE-2010-2244\n[0.6.16-8.el5]\n- Related: #609318 \n- Fixes CVE-2010-2244", "modified": "2010-07-13T00:00:00", "published": "2010-07-13T00:00:00", "id": "ELSA-2010-0528", "href": "http://linux.oracle.com/errata/ELSA-2010-0528.html", "title": "avahi security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "debian": [{"lastseen": "2018-10-16T22:13:22", "bulletinFamily": "unix", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-2086-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nAugust 04, 2010 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : avahi\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2009-0758 CVE-2010-2244\n\nSeveral vulnerabilities have been discovered in the Avahi mDNS/DNS-SD\ndaemon. The Common Vulnerabilities and Exposures project identifies\nthe following problems:\n\nCVE-2009-0758\n\n Rob Leslie discovered a denial of service vulnerability in the\n code used to reflect unicast mDNS traffic.\n\nCVE-2010-2244\n\n Ludwig Nussel discovered a denial of service vulnerability in\n the processing of malformed DNS packets.\n\nFor the stable distribution (lenny), this problem has been fixed in \nversion 0.6.23-3lenny2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 0.6.26-1.\n\nWe recommend that you upgrade your Avahi packages.\n\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23.orig.tar.gz\n Size/MD5 checksum: 1104410 aab1a304851d8145ea5f6a85c10af9e9\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23-3lenny2.diff.gz\n Size/MD5 checksum: 30974 f61a700480e9a26d91076923a5f07e4d\n http://security.debian.org/pool/updates/main/a/avahi/avahi_0.6.23-3lenny2.dsc\n Size/MD5 checksum: 2319 e0e18cae129c74514565cd120b15acb2\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/a/avahi/python-avahi_0.6.23-3lenny2_all.deb\n Size/MD5 checksum: 29456 b94b301976fa60d9b602f7a966500a9f\n http://security.debian.org/pool/updates/main/a/avahi/avahi-discover_0.6.23-3lenny2_all.deb\n Size/MD5 checksum: 36672 dc16c7988c893da9213b9ebb62ead46e\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 35324 e16e057a8c198560d1afbf16425a7b0e\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 89922 c8f116727b706a4048f253ff8d791f33\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 44908 3f331f1f9ebbf3a7c1da2c89e235fc0f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 201096 eb5b6738fa319bfdb74a0f503e73f796\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 71408 b2dbc376d1479d774764adab430fc2c5\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 49934 2433df969a6fab9fd24107baf8f82135\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 78288 9389d8cb4787ddc03b84b0a55be4625a\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 39082 d1876ded6eec7250cfc2bc5318ba377d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 53036 961fa9f3a1042f5d56cd456ad62fa7d4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 58068 647aeb444433b11c28e1c5dbefd2d538\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 32326 d21a20c31bfa23f68e36ab25c7290efc\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 118384 43ba606a86d307659e2c251c3fba2938\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 47008 c403266b42dd288111313d7c8b5c7d76\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 34278 45864830230e0b9ef9e702fcf5e4404b\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 686554 57f463151e13887c421151f2e4b2609c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 36842 14c4a1f37301287cb1411d237571e1f9\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 66672 130f052d086d322fad1711f9fefe3ac6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 50140 5c56cf826e1e8e68cadaa21348f76959\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 49160 38cb361f83981cc967c35e8f222e7b5d\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 53306 21efdaa7fcb87af43f931a1892edd659\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 32380 ea0b7ebe07a9f4c71f2092b93e296b50\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 34314 8557d40c366f247dd726280e43485773\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 32036 9c312b838cfc3da506ba4533b0633992\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 75194 529c1ae0403c2d5ff2f6a91c57d86cbc\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 58374 db411fafb34d1d115a0fbe10f4b54f25\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 41766 7e137a1bd321f061ebfd872ceedd9c0c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_alpha.deb\n Size/MD5 checksum: 34380 939e253c6e3d12753d7bc319f6fe3b3f\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 62824 286d7f9cb789a60b85c8dc7755b99b5c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 51292 2913b7cc7ba86baf59eaa388198259cf\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 33960 f1577615f2ac27fb2f50d00733bbe32f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 32024 4efdbcfbb9bb24919e1e9c44f6a3c736\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 48496 7be648f50343dd836691582763007a9f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 34688 1101fe277caba6ff617cfb36268ab593\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 53690 4bda754290278d734b592eb38cf674f8\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 47324 ddbcb2272a71ee13d93990daa18f2cdb\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 49810 e13ed569863f98da2fa1eadcc8e79c82\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 31290 a738ab55b39ce0dc55178ce698ad95a0\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 688782 c17fd4bab869df2a5120a138fbc7ce6c\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 39280 98825137064de14307e60fd7d63f1243\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 42618 150ea460ab73f35d8cc83be1647f0af0\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 162492 4e0dd7831cb9120e45af93e81cab3df6\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 49442 c6051f3d2f84ddff7188c4128070f176\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 55008 03df8348b0a77efd6c13fcabbef1cb9e\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 44918 41161d5e45b5bc878e5e0c59e3706f78\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 34054 526988eb85d56ede9c7cb4cdfa4f9c3b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 61418 d27cea4086150807106a9e741b567dfb\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 69336 64063da1529853b1a5cc382f0ee53eb2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 50144 dcf828721c4856610187dec5fa81c96f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 64240 12d8b242bad3243fe8ffda96c7d1dbf6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 32888 46a155ac4caad0ac07fb657cad06471c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 123924 cd832445e521d94efa68156647841c19\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 91924 24f4f6530ba4c2b54cea91e9e2d4d071\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 32588 141beb9f8fa9b79066714919b3fbcd9a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_amd64.deb\n Size/MD5 checksum: 34102 afda7cc8d53b1c90e0fc4daf9f6cc314\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 146268 4da95135b8b59a6e19354a6e7bb10922\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 32468 fd999da2644cbd79f27134fb13acae90\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 33074 3b0797fe3fc16a737487a25c3c3e91ae\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 60900 d5f91fab7718e473a6d279f91d6586d1\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 45220 4ea09715bb0049355de9980c96d6ca5c\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 649280 3a473dd2581b00afb1595da17521a83b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 32728 70e54071d97d19115a2316bba82ae29c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 59788 72de2153ae551fe57ebf3e5a12dc094e\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 38542 7d544df5b8144ce4976205021e955d8f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 58644 854890b117dd2bf67b02dfd25e94d060\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 31628 3124bfc2a2ecbd0313a0052557a9f927\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 50276 445158172c49c5e1c47445c15cadfdb1\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 45880 9a923ded7cb8334c72d6c1df3d626178\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 41504 c0427441d5b73e2b2ae240c3628a50be\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 50334 5c14da488d7474d798a479b62342253b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 39488 1014532e6ad5e368fa890c9a68c991d0\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 65356 41497b5c96580ccf46fd0f3f0dc23e1b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 32106 fa20164b2afe4890446ea2e7327a631a\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 88674 d89a73a8b075328c6b94fe4b06da8074\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 34094 8e3097bf29e0f44289662e8f5ca34c90\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 108442 8c76784edae3799df600d427fcc07bdd\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 51182 040505e72ac42e8c5e09f52d8753e6e1\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 43162 6ca1f17072ad667ed16dd9e74c75c5a7\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 47166 069880955a40f7ec82e4746d613b2241\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 48780 661ac64a333f6a9e73e044db35e234bf\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 33270 838b8973e2288c193c02f2f3bd1ee1a4\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_arm.deb\n Size/MD5 checksum: 33306 518aa9706f6f9b891ab19b5b39739131\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 146830 9754f65b655e49683db642e622fe5159\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 61698 9b0d44f23bf82e53f1094e53afb83804\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 66458 38881c16c9335c3ac8256d82d6ae8939\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 652942 6974153f7039481d2c12a94545cc6887\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 46496 70e968ed3ff06318aaff4ad93e0fb153\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 50068 d3c326e96d8c0f2f1a0d2d16d5fac45b\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 51364 53fbfb9bb0c466f8876ed2a53029c6f4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 33662 8745caf1f81cf9a1b5b1e11ddaae00df\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 32152 2ea7172c2c6de9d5f65b35cd2efd7c12\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 88056 33d9ddb2fae393edec9d0fd0c076dd09\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 45100 0aa5ec5ef8dc747a9ed21538c2616e51\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 48764 04433b9318d188cf96aadee82ebc0120\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 34340 9fcafa9d44ca4614afe8eb5078951b12\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 33046 5036533a9149f15ca7abbce027605b31\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 49126 1b96741441a4456c0387a3a85a19c85e\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 60106 137e1a6a9d635ed0c775db45ce6f0320\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 110262 e4fefc8e629f6a025598a4ee1e6d40af\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 33578 8119b84742ad28955eab6d1e706d660d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 41478 335899d7061f91ce7dc7d7ac65846335\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 38590 bcf0207b3592ca64d4201bad74692075\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 60680 a2390ff9256357b918aa242e535c37ee\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 39976 b2382de4f508046ec65134dd664c87d4\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 51530 67cbabc40b519abb09fa49203909d302\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 43328 d84752eddda8bddfa0ac2d146f778b84\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 32782 d4faadf1cff80585b483bab9e7bb2d59\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 31662 9b21b2c45ee331783179668c057531eb\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_armel.deb\n Size/MD5 checksum: 33430 2089f4c6e62254387bbedc03d7bee749\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 61784 0193328b68ce84d1b69f9948a05c470c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 151836 beba56aeb5bdfcca907f0e450ac57358\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 59638 f376df3d41a6932dd180c81e1c9e2c93\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 45780 24a63e377bb7a39b89b705abb7c4e49f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 46898 7ce11fa8172c958603a2c368541490d9\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 33734 02ecc47f299cd0cb274e738800cef828\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 38668 190ca5849ab2f3952fe2c8afb51f0d18\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 49112 d2edf6401432b1df355cec364e1f5d39\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 51112 5fbfa4a4e17b253a6c22984f3a5ab80c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 66730 0b02df8014b6e150fae27362f254f457\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 40668 77855d2a17058b4c347ab86017e0dd38\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 31304 d8415fdc9f47e2a3205e17f4c2939e98\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 115386 f56705a9517a6b2c8ca88b28bc4dc1ae\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 47048 f68efb5b48700051486b1d6282c7777f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 60120 f236ea42f40b9e573d51f5bcaeb06faf\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 31802 129bbdf9e21e748c3e36413a8d915511\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 33882 4da373a2af199135d3fda871971322ca\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 87894 84477c99412a5340258cdf5003a8dc8f\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 48752 e583ffc223b9ac5ab85fd0f78168a60a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 33880 d67dff0a7c953bf5fb520b469a269799\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 47960 bd55f44b793609bc64f5321d43e365aa\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 51996 cd4c93ba7e157fabca95f487ecbda23d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 32546 211c6f9d5391752511c12c5f1aea36e6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 32294 93a9e68ea067a8713a619a41c613dfdd\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 42180 022c289ca8a53fecdccf4832f419148b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 34180 95408de4a3026d76dc37ae91ca9a6e73\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_i386.deb\n Size/MD5 checksum: 650048 90338b8d89c29f3fd0147ebfbda1b321\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 46468 72f737fae568cc1638c0921fb76cd83d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 33276 3a2da50e86383f43da4c740e2e8d2da5\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 620588 a26679722d3c309dde3aa0723c93fe3a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 55840 f746e9a61735819065922923bd23f56c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 56344 7c6e9be349abb079ffe2c37baf7ddfba\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 78652 04491f3d3192ddda6dc460034a4f35a4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 36000 e75883a7710233298996c76aa98042fe\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 77886 bfc76dd721d293f7a783283892fb06d0\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 61744 8cfa501d579973798fe617eed179f4dd\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 66300 2187a03a6c3f54dee41b8b178aa3b5c6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 54288 7a5c20d042ffd9e7b0224f9e66cd5f91\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 55964 3361738d3b8a05b2297f7999bbe99057\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 35566 6ccc6a85e8b5f4c2ddd19c64e628c6e2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 36290 2c31848864283f6c914f4f8be19cf864\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 49542 fb9ca77224afcab70cd7f60945976cd5\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 109328 69a20ee280c7bf81bd82a09dde3f8f4a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 54240 95dcb3e83cada4446c044d7c4a717ce2\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 41126 24710a11bbe9be188afdafdf9a197c8f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 52872 f60a35654d213e4699e53e6d2c43bbc8\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 212814 c7a6113b35ff5aa8f693cd00aa43bca6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 34590 6799fcb147ce6fc4da94c3a45695c9b7\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 34034 2178594182d832a6a04ebb6eaed1e523\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 70292 939c0de47112b50c3b362289ca343a3d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 62870 5f187881aad88473561dcb058aaabdec\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 35384 eb3ed802747d622e3d8b2898955c41af\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 32134 9af8b78bb80480e39a49bfb990f50251\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_ia64.deb\n Size/MD5 checksum: 153522 8b3019b9bab2620b7985d94caab85f0f\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 35420 5f83324460244091a74b23dcf42dda22\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 34166 46a530124395bfe5165549a3e221a070\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 33768 c65b56ce14a22789cc9a058224d32743\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 49498 11e77f12c8bb0ee6a438a727b0cb40c8\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 33958 78cbaa9adcd18d0f2561f71f93b0d232\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 64864 0dd8dac0a0c99097dbfca1ca46c0439c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 42302 dcbef3b103d05256f8835707147b6f85\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 33438 19d705f37379e043c06d2355c1b5973a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 65760 5493867c0dbef8a69a5a296d6c1ac27c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 46090 af56c8a7a06d6ab14b8cb47e96bf87f9\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 69874 5fb0787218374eac8fde46e99dd22d09\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 685890 9dafe3ccc5dd08d391da67bba586d1e5\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 31456 c55b47128bb3300274bf6b8641f83aad\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 44538 740b5f6e8d280027e915e366f8a700d3\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 32918 7a393d8c88b06a61ea6ec6376c4a2de0\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 50428 2be67db1e5f758c88ade3bc4e207c377\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 49396 6aa53f0fd0edde2f7cd8d7f4f883bc67\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 62514 29387c0071aa5f1f5eddfe87e8722181\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 86534 203d772ff1d7aae5b0e749f7d657cd72\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 40338 e34ebad670c69563eabb1a769cf54a5f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 32190 3ad5fab540e38e68cf9944ca72589570\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 51320 0ddbe35ed48b87f58d0b26a9d9002e10\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 38660 e5cf54fe146833279f16fcecdee9d026\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 168170 02fd9c6e87daec043a9277ed23de35fa\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 47738 49491c48a5408cca370ed8fe92450836\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 106098 822908f6135360db9c26941483f6ae34\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_mips.deb\n Size/MD5 checksum: 51616 f7cdc78a36a0d2d750ac062277884f77\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 38848 bdb3195b36155a2fb8fd90b83e139c27\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 40322 8f62f12b559483dbe7e3baf7f7065ded\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 35314 8eaf6dd2c17379fe00913e0374a43680\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 32802 f0c83ab6a42aed99eb5def924b9a90c7\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 62142 43110ab2eff15157089ef61ce1b011e8\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 49800 b21656c42215b3bee1ad38e6a6deaf48\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 42244 60f06b57aeab7f44ed73cd1ff6868acf\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 49604 6cdd0ee612d5bcd78e4ce7bdf04031b7\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 50710 bba1f80e92d70e1f93f1fafbd88e8860\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 33820 86008e7c8f43ed976a863cc8f0db242a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 44496 06a8d3fceb8cb7241a1fe281b2e14531\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 32110 b94f3df3bdb37c73276ebbb7ae08b2a2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 70056 2653003d1f9c318e982d57ad4f2815ea\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 31304 74695ccb3ad2a5dbaf3301f634afa1c9\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 66202 1000fa0b99af073e3bcfadf247a57381\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 106186 c3fcd394cdbb5fd9c82a4a7cb01d180c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 168582 5cb247dd9ba6af8fe44fcd42e4a472f1\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 86564 f0c61b7e97d8dc0aa068db0e3da78350\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 34426 714909abcb28bda06da7cd5175ad9149\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 52406 43b6984930670203708ce747ce58f746\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 65124 f283ebb3acafe43d8166c1a1ecc72d6b\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 51300 31de1bd7c7fcd30f9ef32ef7b9bb4238\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 33390 65cf3307296347500430cee802a403d3\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 676276 7bfc2baa7c17d34848284a19cd4c303f\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 33718 7fcf2d2ba94fa40349e8473d238e30a6\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 48012 598c06d80d4a5d22c3d89305c6410572\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_mipsel.deb\n Size/MD5 checksum: 46030 1bccbb466f21323eb237062c2405f4e0\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 33364 7fc62cf40e620c0f6d0bb8fbd84a73c4\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 53232 9645da2340fe5f946807c0a1d7ec340d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 49430 b7b817699a46583c93e26f339f91b4d7\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 36708 c31f7b3452a6c637d092872a422660f2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 67026 cd9ece9eac67282798e397c00b4b31e4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 59912 f3f347bf36eff8bb2e4a0c0fe43abe15\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 35134 0087601ffc832588cdd3ec4648ea2e9e\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 60248 49fc4acfe70f4066e1529e25bd39809c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 52584 06e2abec7963a5aaaca40fdc1e5eb51a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 31442 76edb3ca5b02fe8bcf113d09f0d9efcc\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 35274 6f5e35df957f0266f569b778b7c8b159\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 46972 d6e72ffcd1408332e880efc51ab2899a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 61148 5a5b20b552b0a38752eb89bd72bd1656\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 93152 3d427c83479c86c6f450ffd92d61c9a0\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 41370 14202f794d7436ae4a4214161dd1d739\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 36366 6313ac62d2540c22bc5d6d3cd4cfbdce\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 145282 55d545c7989b66d47415b0fcd6a32475\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 33166 5ee7a20df60f435fe75500de7c15698c\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 43482 bf2dafa51d5522e7a3ee5c3d61c90ae4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 55666 9e7096d747b1cdc2a80c517c2485a8c4\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 48552 b1f16bf4dc7ce982e4a42ef5330439f0\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 44960 088a90cbcd607a5f5a7efe50a888d46d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 121248 49639aef4cb98e74b570d65722319ddc\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 690506 d7ab8de0afb4e8a0f432d2e316b9bdb5\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 59734 ed418aa04c908b438ddcd8feebab15cc\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 50624 22b5b2743fce2007c27a121f80501c00\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_powerpc.deb\n Size/MD5 checksum: 34598 b691ec01c7f3c250cafa9b0a57d8babe\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 34128 0dd1e528cda0d2bedbdf1f4cefcb18d9\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 50226 f509f214cdfdd4f822441f9d02f1b1ff\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 44376 8c24af01bc395215f92240b4ee7a13df\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 93138 5cd7ce1b12e0b02d1c9885d026cb1532\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 47372 d7adc95ec07edcb6f909f4287de855f7\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 34522 bd95d35cc4d477f40742f11f32c658c7\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 34910 a0946f9bc0c1c5164e39f98d190fd753\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 39602 556e922edcf399815cad4396934f3174\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 669870 a3f50cf2fa37bdefa5ad4a6ac3707502\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 34196 49ccb68240428142f046d745e3cd0bdb\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 33114 8db81d073929528b6a5bb35e06d4a3c5\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 48544 bc208eb25816425bfd7b25c8e38791aa\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 63538 2c235d9348b7b72875b04907b6f2f821\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 33876 462991d65369c3048d4265b91cc8a674\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 53286 4ef24f66373df7cd6fa16eccf00665bc\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 54328 b67d6bdb1aafc0443d3ea8f72fc3b8e3\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 41924 d1f4c375b43262837fe09d50b1fcfb60\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 31814 ff80adab710778c736d25bdeb879e6cc\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 52366 896c2deec0fd03f9e1cd28f6d0530d63\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 64068 e1416f6a9fa9b8ffea8139d8213e9174\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 51610 aa17d20097011aeb54fabee978c1352d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 52544 186fc9c26543e492de639d6b78db7eec\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 69282 2044a1a9cdbd3c7d650f70f4f59556cd\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 32178 e005ad99f219075727d6e4e244bb63f3\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 157806 f9586e76160b8a7af3ee678d37c1ed73\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 122808 dbd4eaaf90b28cd8c2a0c607e8685285\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_s390.deb\n Size/MD5 checksum: 61214 810aaf3eeaf4668e89509aeaef93acad\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 62956 265f55afb7d922d546932539a31af62f\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dnsconfd_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 38954 16d187a5606e181e8c44e7cba27cf703\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-client3_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 51288 68e8f3c3498b7b612a0d8a7599b0b758\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-data_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 32162 6cd9d7f5de433036190728df3047c7be\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 33916 5ad604e33c1ee1825012653f1c2ef43a\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common3_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 48352 194c978e3963510af9e10083a9971065\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 34414 65a890bf6e57d4ac3f1d325ee51d6fd7\n http://security.debian.org/pool/updates/main/a/avahi/avahi-ui-utils_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 34154 8af251e0d9e0b1c7adcbcd5a9b69c474\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core5_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 112720 89e1a9fa715462d75a62090ce48aeaf2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt3-1_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 33360 cd820db5b258eb46d9d2e428b1b2c3cb\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-core-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 156152 a3c639b09c49a22d3b9c15c91249911b\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl0_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 48236 cb73d7952bf61526ba8d14c2d13d07a2\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 32638 1d7bde06b10fb66a92f2512de6014df3\n http://security.debian.org/pool/updates/main/a/avahi/avahi-autoipd_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 49816 525386c13815cfa2bdc47c749412fc72\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 49194 cf16ec6463aede628f3040b1974f717e\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-glib1_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 32336 c9c95e0455873486f80b0a5465beb9cd\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 47674 48fcd958ed40077447a35c9c9281ed2d\n http://security.debian.org/pool/updates/main/a/avahi/avahi-dbg_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 608490 5fe0b3458222beb271daa3160dc91ce1\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-howl-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 63162 c27eb7fe35020bfe3582a6934261e880\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-common-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 67822 db70861b1b2b78715b9a08c21fba91c3\n http://security.debian.org/pool/updates/main/a/avahi/avahi-utils_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 52268 1c44465eed73ecd18811e52c24fc7f4e\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-gobject0_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 42456 6d906cf3189ddcd4334c4e4fd5df458d\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd-dev_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 59872 26577d949ef29e1ed367074265bbc3d5\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-qt4-1_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 31660 95c6c3868ea426a5a404d1771a93f9ef\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-ui0_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 44766 32b4925fed06011c58efdf6a1dc3918f\n http://security.debian.org/pool/updates/main/a/avahi/libavahi-compat-libdnssd1_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 40138 4817411a72f7591141d7ba3e3909caca\n http://security.debian.org/pool/updates/main/a/avahi/avahi-daemon_0.6.23-3lenny2_sparc.deb\n Size/MD5 checksum: 89338 0a1f27a2dcefd797bd3768339dcc30c8\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "modified": "2010-08-04T02:48:28", "published": "2010-08-04T02:48:28", "id": "DEBIAN:DSA-2086-1:21155", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2010/msg00131.html", "title": "[SECURITY] [DSA 2086-1] New avahi packages fix denial of service", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}