avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1426712 | Issue Tracking Patch Third Party Advisory |
https://github.com/lathiat/avahi/issues/203 | Exploit Third Party Advisory |
https://github.com/lathiat/avahi/issues/203#issuecomment-449536790 | Third Party Advisory |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | |
https://usn.ubuntu.com/3876-1/ | Third Party Advisory |
https://usn.ubuntu.com/3876-2/ | Third Party Advisory |
https://www.secfu.net/advisories | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-05-01T01:00:00
Updated: 2020-07-29T11:06:42
Reserved: 2017-03-07T00:00:00
Link: CVE-2017-6519
JSON object: View
NVD Information
Status : Modified
Published: 2017-05-01T01:59:00.297
Modified: 2023-11-07T02:49:56.390
Link: CVE-2017-6519
JSON object: View
Redhat Information
No data.
CWE