A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Max CVSS
6.2
EPSS Score
0.04%
Published
2023-11-02
Updated
2023-11-09
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-05-26
Updated
2023-06-02
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-02-17
Updated
2022-12-06
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-05-07
Updated
2021-05-17
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-06-02
Updated
2023-06-22
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Max CVSS
9.1
EPSS Score
4.77%
Published
2017-05-01
Updated
2020-07-29
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Max CVSS
5.0
EPSS Score
7.51%
Published
2011-02-22
Updated
2023-12-22
The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
Max CVSS
4.3
EPSS Score
3.20%
Published
2010-07-08
Updated
2011-03-07
The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
Max CVSS
7.8
EPSS Score
3.26%
Published
2009-03-03
Updated
2010-08-12

CVE-2008-5081

Public exploit
The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
Max CVSS
5.0
EPSS Score
95.38%
Published
2008-12-17
Updated
2017-09-29
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
Max CVSS
2.1
EPSS Score
0.07%
Published
2007-06-22
Updated
2018-10-16
The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
Max CVSS
5.0
EPSS Score
11.98%
Published
2006-12-31
Updated
2011-03-08
Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
Max CVSS
2.1
EPSS Score
0.04%
Published
2006-11-14
Updated
2018-10-03
Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.
Max CVSS
2.1
EPSS Score
0.04%
Published
2006-05-10
Updated
2018-08-13
Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.
Max CVSS
3.6
EPSS Score
0.06%
Published
2006-05-10
Updated
2018-08-13
19 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!