CVE-2017-6519

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.7:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:29

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1426712 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1426712 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/lathiat/avahi/issues/203 - Exploit, Third Party Advisory () https://github.com/lathiat/avahi/issues/203 - Exploit, Third Party Advisory
References () https://github.com/lathiat/avahi/issues/203#issuecomment-449536790 - Third Party Advisory () https://github.com/lathiat/avahi/issues/203#issuecomment-449536790 - Third Party Advisory
References () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E - () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E -
References () https://usn.ubuntu.com/3876-1/ - Third Party Advisory () https://usn.ubuntu.com/3876-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3876-2/ - Third Party Advisory () https://usn.ubuntu.com/3876-2/ - Third Party Advisory
References () https://www.secfu.net/advisories - Third Party Advisory () https://www.secfu.net/advisories - Third Party Advisory

07 Nov 2023, 02:49

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'name': '[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E -

Information

Published : 2017-05-01 01:59

Updated : 2024-11-21 03:29


NVD link : CVE-2017-6519

Mitre link : CVE-2017-6519

CVE.ORG link : CVE-2017-6519


JSON object : View

Products Affected

canonical

  • ubuntu_linux

avahi

  • avahi
CWE
CWE-346

Origin Validation Error