Avahi 0.6.5

CPE Details

Avahi 0.6.5
0.6.5
2019-01-08
17h01 +00:00
2019-01-08
17h01 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*

Informations

Vendor

avahi

Product

avahi

Version

0.6.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-38473 2023-11-02
15h00 +00:00
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
6.2
Medium
CVE-2023-38472 2023-11-02
14h59 +00:00
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
6.2
Medium
CVE-2023-38471 2023-11-02
14h58 +00:00
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
6.2
Medium
CVE-2023-38470 2023-11-02
14h57 +00:00
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
6.2
Medium
CVE-2023-38469 2023-11-02
14h49 +00:00
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
6.2
Medium
CVE-2021-3468 2021-06-02
15h09 +00:00
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
5.5
Medium
CVE-2021-26720 2021-02-17
20h19 +00:00
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
7.8
High
CVE-2017-6519 2017-04-30
23h00 +00:00
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
9.1
Critical
CVE-2011-1002 2011-02-22
17h00 +00:00
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
5
CVE-2008-5081 2008-12-17
01h00 +00:00
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
5
CVE-2007-3372 2007-06-22
19h00 +00:00
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
2.1
CVE-2006-5461 2006-11-14
21h00 +00:00
Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
2.1