Vulnerability Details : CVE-2009-0758
The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-0758
Probability of exploitation activity in the next 30 days: 3.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0758
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.8
|
HIGH | AV:N/AC:L/Au:N/C:N/I:N/A:C |
10.0
|
6.9
|
NIST |
CWE ids for CVE-2009-0758
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-0758
-
Red Hat 2010-07-13This issue has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0528.html.
-
http://www.securityfocus.com/bid/33946
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html
-
http://www.openwall.com/lists/oss-security/2009/03/02/1
-
http://www.debian.org/security/2010/dsa-2086
Debian -- Security Information -- DSA-2086-1 avahi
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:076
- cpe:2.3:a:avahi:avahi-daemon:0.6.23:*:*:*:*:*:*:*