CVE-2006-5461

Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
References
Link Resource
http://avahi.org/milestone/Avahi%200.6.15
http://secunia.com/advisories/22807 Patch Vendor Advisory
http://secunia.com/advisories/22852 Patch Vendor Advisory
http://secunia.com/advisories/22932
http://secunia.com/advisories/23020
http://secunia.com/advisories/23042
http://securitytracker.com/id?1017257
http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:215
http://www.novell.com/linux/security/advisories/2006_26_sr.html
http://www.securityfocus.com/bid/21016
http://www.vupen.com/english/advisories/2006/4474
https://exchange.xforce.ibmcloud.com/vulnerabilities/30207
https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html
https://usn.ubuntu.com/380-1/
http://avahi.org/milestone/Avahi%200.6.15
http://secunia.com/advisories/22807 Patch Vendor Advisory
http://secunia.com/advisories/22852 Patch Vendor Advisory
http://secunia.com/advisories/22932
http://secunia.com/advisories/23020
http://secunia.com/advisories/23042
http://securitytracker.com/id?1017257
http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:215
http://www.novell.com/linux/security/advisories/2006_26_sr.html
http://www.securityfocus.com/bid/21016
http://www.vupen.com/english/advisories/2006/4474
https://exchange.xforce.ibmcloud.com/vulnerabilities/30207
https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html
https://usn.ubuntu.com/380-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:19

Type Values Removed Values Added
References () http://avahi.org/milestone/Avahi%200.6.15 - () http://avahi.org/milestone/Avahi%200.6.15 -
References () http://secunia.com/advisories/22807 - Patch, Vendor Advisory () http://secunia.com/advisories/22807 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22852 - Patch, Vendor Advisory () http://secunia.com/advisories/22852 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22932 - () http://secunia.com/advisories/22932 -
References () http://secunia.com/advisories/23020 - () http://secunia.com/advisories/23020 -
References () http://secunia.com/advisories/23042 - () http://secunia.com/advisories/23042 -
References () http://securitytracker.com/id?1017257 - () http://securitytracker.com/id?1017257 -
References () http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml - () http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:215 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:215 -
References () http://www.novell.com/linux/security/advisories/2006_26_sr.html - () http://www.novell.com/linux/security/advisories/2006_26_sr.html -
References () http://www.securityfocus.com/bid/21016 - () http://www.securityfocus.com/bid/21016 -
References () http://www.vupen.com/english/advisories/2006/4474 - () http://www.vupen.com/english/advisories/2006/4474 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30207 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30207 -
References () https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html - () https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html -
References () https://usn.ubuntu.com/380-1/ - () https://usn.ubuntu.com/380-1/ -

Information

Published : 2006-11-14 22:07

Updated : 2024-11-21 00:19


NVD link : CVE-2006-5461

Mitre link : CVE-2006-5461

CVE.ORG link : CVE-2006-5461


JSON object : View

Products Affected

avahi

  • avahi