ID CVE-2011-1002
Summary avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
References
Vulnerable Configurations
  • Avahi 0.6.24
    cpe:2.3:a:avahi:avahi:0.6.24
  • Avahi 0.6.25
    cpe:2.3:a:avahi:avahi:0.6.25
  • Avahi 0.6.23
    cpe:2.3:a:avahi:avahi:0.6.23
  • Avahi 0.6.20
    cpe:2.3:a:avahi:avahi:0.6.20
  • Avahi 0.6.18
    cpe:2.3:a:avahi:avahi:0.6.18
  • Avahi 0.6.22
    cpe:2.3:a:avahi:avahi:0.6.22
  • Avahi 0.6.21
    cpe:2.3:a:avahi:avahi:0.6.21
  • Avahi 0.5.1
    cpe:2.3:a:avahi:avahi:0.5.1
  • Avahi 0.5.2
    cpe:2.3:a:avahi:avahi:0.5.2
  • Avahi 0.4
    cpe:2.3:a:avahi:avahi:0.4
  • Avahi 0.5
    cpe:2.3:a:avahi:avahi:0.5
  • Avahi 0.2
    cpe:2.3:a:avahi:avahi:0.2
  • Avahi 0.3
    cpe:2.3:a:avahi:avahi:0.3
  • Avahi 0.1
    cpe:2.3:a:avahi:avahi:0.1
  • Avahi 0.6.15
    cpe:2.3:a:avahi:avahi:0.6.15
  • Avahi 0.6.16
    cpe:2.3:a:avahi:avahi:0.6.16
  • Avahi 0.6.14
    cpe:2.3:a:avahi:avahi:0.6.14
  • Avahi 0.6.17
    cpe:2.3:a:avahi:avahi:0.6.17
  • Avahi 0.6.5
    cpe:2.3:a:avahi:avahi:0.6.5
  • Avahi 0.6.7
    cpe:2.3:a:avahi:avahi:0.6.7
  • Avahi 0.6.19
    cpe:2.3:a:avahi:avahi:0.6.19
  • Avahi 0.6.6
    cpe:2.3:a:avahi:avahi:0.6.6
  • Avahi 0.6.3
    cpe:2.3:a:avahi:avahi:0.6.3
  • Avahi 0.6.9
    cpe:2.3:a:avahi:avahi:0.6.9
  • Avahi 0.6.4
    cpe:2.3:a:avahi:avahi:0.6.4
  • Avahi 0.6.8
    cpe:2.3:a:avahi:avahi:0.6.8
  • Avahi 0.6.1
    cpe:2.3:a:avahi:avahi:0.6.1
  • Avahi 0.6.2
    cpe:2.3:a:avahi:avahi:0.6.2
  • Avahi 0.6.10
    cpe:2.3:a:avahi:avahi:0.6.10
  • Avahi 0.6.11
    cpe:2.3:a:avahi:avahi:0.6.11
  • Avahi 0.6.12
    cpe:2.3:a:avahi:avahi:0.6.12
  • Avahi 0.6.13
    cpe:2.3:a:avahi:avahi:0.6.13
  • Avahi 0.6.26
    cpe:2.3:a:avahi:avahi:0.6.26
  • Avahi 0.6.27
    cpe:2.3:a:avahi:avahi:0.6.27
  • Avahi 0.6.28
    cpe:2.3:a:avahi:avahi:0.6.28
CVSS
Base: 5.0 (as of 22-02-2011 - 15:24)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-11588.NASL
    description Fixes CVE-2011-1002. The MITRE CVE dictionary describes this issue as : avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244. Find out more about CVE-2011-1002 from the MITRE CVE dictionary and NIST NVD. This also disables gtk3 support. Unfortunately gtk3 support in F14 is broken and Avahi cannot be compiled against it. Since gtk3 will not be fixed in F14 anymore and nobody uses it we instead disable it in Avahi. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 56151
    published 2011-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56151
    title Fedora 14 : avahi-0.6.27-8.fc14 (2011-11588)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-3033.NASL
    description Fixes CVE-2011-1002 among other smaller things Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 52664
    published 2011-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52664
    title Fedora 15 : avahi-0.6.29-1.fc15 (2011-3033)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0779.NASL
    description Updated avahi packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) This update also fixes the following bug : * Previously, the avahi packages in Red Hat Enterprise Linux 6 were not compiled with standard RPM CFLAGS; therefore, the Stack Protector and Fortify Source protections were not enabled, and the debuginfo packages did not contain the information required for debugging. This update corrects this issue by using proper CFLAGS when compiling the packages. (BZ#629954, BZ#684276) All users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 54600
    published 2011-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54600
    title RHEL 6 : avahi (RHSA-2011:0779)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-0436.NASL
    description Updated avahi packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 53434
    published 2011-04-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53434
    title CentOS 5 : avahi (CESA-2011:0436)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-037.NASL
    description A vulnerability has been found and corrected in avahi : avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244 (CVE-2011-1002). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 52454
    published 2011-02-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52454
    title Mandriva Linux Security Advisory : avahi (MDVSA-2011:037)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110412_AVAHI_ON_SL5_X.NASL
    description A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61017
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61017
    title Scientific Linux Security Update : avahi on SL5.x i386/x86_64
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-040.NASL
    description A vulnerability has been found and corrected in pango : It was discovered that pango did not check for memory reallocation failures in hb_buffer_ensure() function. This could trigger a NULL pointer dereference in hb_buffer_add_glyph(), where possibly untrusted input is used as an index used for accessing members of the incorrectly reallocated array, resulting in the use of NULL address as the base array address. This can result in application crash or, possibly, code execution (CVE-2011-0064). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 52541
    published 2011-03-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52541
    title Mandriva Linux Security Advisory : pango (MDVSA-2011:040)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_8B986A054DBE11E08B9A02E0184B8D35.NASL
    description Avahi developers reports : A vulnerability has been reported in Avahi, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing certain UDP packets, which can be exploited to trigger an infinite loop by e.g. sending an empty packet to port 5353/UDP.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 52666
    published 2011-03-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52666
    title FreeBSD : avahi -- denial of service (8b986a05-4dbe-11e0-8b9a-02e0184b8d35)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2174.NASL
    description It was discovered that Avahi, an implementation of the zeroconf protocol, can be crashed remotely by a single UDP packet, which may result in a denial of service.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 52462
    published 2011-03-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52462
    title Debian DSA-2174-1 : avahi - denial of service
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_AVAHI-110228.NASL
    description This update fixes a remote denial of service in the avahi daemon that can be triggered remotely via a null UDP packet. CVE-2011-1002: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P): Resource Management Errors (CWE-399)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75435
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75435
    title openSUSE Security Update : avahi (openSUSE-SU-2011:0149-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110519_AVAHI_ON_SL6_X.NASL
    description Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) This update also fixes the following bug : - Previously, the avahi packages in Scientific Linux 6 were not compiled with standard RPM CFLAGS; therefore, the Stack Protector and Fortify Source protections were not enabled, and the debuginfo packages did not contain the information required for debugging. This update corrects this issue by using proper CFLAGS when compiling the packages. (BZ#629954, BZ#684276) All users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61038
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61038
    title Scientific Linux Security Update : avahi on SL6.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-0436.NASL
    description From Red Hat Security Advisory 2011:0436 : Updated avahi packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 68255
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68255
    title Oracle Linux 5 : avahi (ELSA-2011-0436)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0436.NASL
    description Updated avahi packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print to, and find shared files on other computers. A flaw was found in the way the Avahi daemon (avahi-daemon) processed Multicast DNS (mDNS) packets with an empty payload. An attacker on the local network could use this flaw to cause avahi-daemon on a target system to enter an infinite loop via an empty mDNS UDP packet. (CVE-2011-1002) All users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, avahi-daemon will be restarted automatically.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 53400
    published 2011-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53400
    title RHEL 5 : avahi (RHSA-2011:0436)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_AVAHI-110228.NASL
    description This update fixes a remote denial of service in the avahi daemon that can be triggered remotely via a null UDP packet. CVE-2011-1002: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P): Resource Management Errors (CWE-399)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 53697
    published 2011-05-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=53697
    title openSUSE Security Update : avahi (openSUSE-SU-2011:0149-1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-17.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-17 (Avahi: Denial of Service) Multiple vulnerabilities have been discovered in Avahi. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56592
    published 2011-10-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56592
    title GLSA-201110-17 : Avahi: Denial of Service
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1084-1.NASL
    description It was discovered that Avahi incorrectly handled empty UDP packets. A remote attacker could send a specially crafted packet and cause Avahi to hang, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 52580
    published 2011-03-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=52580
    title Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : avahi vulnerability (USN-1084-1)
redhat via4
advisories
  • bugzilla
    id 667187
    title CVE-2011-1002 avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression)
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment avahi is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436002
        • comment avahi is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013003
      • AND
        • comment avahi-compat-howl is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436018
        • comment avahi-compat-howl is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013023
      • AND
        • comment avahi-compat-howl-devel is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436004
        • comment avahi-compat-howl-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013011
      • AND
        • comment avahi-compat-libdns_sd is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436016
        • comment avahi-compat-libdns_sd is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013005
      • AND
        • comment avahi-compat-libdns_sd-devel is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436008
        • comment avahi-compat-libdns_sd-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013021
      • AND
        • comment avahi-devel is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436014
        • comment avahi-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013017
      • AND
        • comment avahi-glib is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436006
        • comment avahi-glib is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013009
      • AND
        • comment avahi-glib-devel is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436010
        • comment avahi-glib-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013019
      • AND
        • comment avahi-qt3 is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436022
        • comment avahi-qt3 is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013015
      • AND
        • comment avahi-qt3-devel is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436012
        • comment avahi-qt3-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013013
      • AND
        • comment avahi-tools is earlier than 0:0.6.16-10.el5_6
          oval oval:com.redhat.rhsa:tst:20110436020
        • comment avahi-tools is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090013007
    rhsa
    id RHSA-2011:0436
    released 2011-04-12
    severity Moderate
    title RHSA-2011:0436: avahi security update (Moderate)
  • bugzilla
    id 684276
    title [PATCH] avahi debuginfo useless
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment avahi is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779005
        • comment avahi is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779006
      • AND
        • comment avahi-autoipd is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779007
        • comment avahi-autoipd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779008
      • AND
        • comment avahi-compat-howl is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779027
        • comment avahi-compat-howl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779028
      • AND
        • comment avahi-compat-howl-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779023
        • comment avahi-compat-howl-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779024
      • AND
        • comment avahi-compat-libdns_sd is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779033
        • comment avahi-compat-libdns_sd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779034
      • AND
        • comment avahi-compat-libdns_sd-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779039
        • comment avahi-compat-libdns_sd-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779040
      • AND
        • comment avahi-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779045
        • comment avahi-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779046
      • AND
        • comment avahi-dnsconfd is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779013
        • comment avahi-dnsconfd is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779014
      • AND
        • comment avahi-glib is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779015
        • comment avahi-glib is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779016
      • AND
        • comment avahi-glib-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779029
        • comment avahi-glib-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779030
      • AND
        • comment avahi-gobject is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779041
        • comment avahi-gobject is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779042
      • AND
        • comment avahi-gobject-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779019
        • comment avahi-gobject-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779020
      • AND
        • comment avahi-libs is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779021
        • comment avahi-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779022
      • AND
        • comment avahi-qt3 is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779035
        • comment avahi-qt3 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779036
      • AND
        • comment avahi-qt3-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779011
        • comment avahi-qt3-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779012
      • AND
        • comment avahi-qt4 is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779009
        • comment avahi-qt4 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779010
      • AND
        • comment avahi-qt4-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779043
        • comment avahi-qt4-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779044
      • AND
        • comment avahi-tools is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779037
        • comment avahi-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779038
      • AND
        • comment avahi-ui is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779017
        • comment avahi-ui is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779018
      • AND
        • comment avahi-ui-devel is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779025
        • comment avahi-ui-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779026
      • AND
        • comment avahi-ui-tools is earlier than 0:0.6.25-11.el6
          oval oval:com.redhat.rhsa:tst:20110779031
        • comment avahi-ui-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110779032
    rhsa
    id RHSA-2011:0779
    released 2011-05-19
    severity Moderate
    title RHSA-2011:0779: avahi security and bug fix update (Moderate)
rpms
  • avahi-0:0.6.16-10.el5_6
  • avahi-compat-howl-0:0.6.16-10.el5_6
  • avahi-compat-howl-devel-0:0.6.16-10.el5_6
  • avahi-compat-libdns_sd-0:0.6.16-10.el5_6
  • avahi-compat-libdns_sd-devel-0:0.6.16-10.el5_6
  • avahi-devel-0:0.6.16-10.el5_6
  • avahi-glib-0:0.6.16-10.el5_6
  • avahi-glib-devel-0:0.6.16-10.el5_6
  • avahi-qt3-0:0.6.16-10.el5_6
  • avahi-qt3-devel-0:0.6.16-10.el5_6
  • avahi-tools-0:0.6.16-10.el5_6
  • avahi-0:0.6.25-11.el6
  • avahi-autoipd-0:0.6.25-11.el6
  • avahi-compat-howl-0:0.6.25-11.el6
  • avahi-compat-howl-devel-0:0.6.25-11.el6
  • avahi-compat-libdns_sd-0:0.6.25-11.el6
  • avahi-compat-libdns_sd-devel-0:0.6.25-11.el6
  • avahi-devel-0:0.6.25-11.el6
  • avahi-dnsconfd-0:0.6.25-11.el6
  • avahi-glib-0:0.6.25-11.el6
  • avahi-glib-devel-0:0.6.25-11.el6
  • avahi-gobject-0:0.6.25-11.el6
  • avahi-gobject-devel-0:0.6.25-11.el6
  • avahi-libs-0:0.6.25-11.el6
  • avahi-qt3-0:0.6.25-11.el6
  • avahi-qt3-devel-0:0.6.25-11.el6
  • avahi-qt4-0:0.6.25-11.el6
  • avahi-qt4-devel-0:0.6.25-11.el6
  • avahi-tools-0:0.6.25-11.el6
  • avahi-ui-0:0.6.25-11.el6
  • avahi-ui-devel-0:0.6.25-11.el6
  • avahi-ui-tools-0:0.6.25-11.el6
refmap via4
bid 46446
confirm
debian DSA-2174
fedora FEDORA-2011-3033
mandriva
  • MDVSA-2011:037
  • MDVSA-2011:040
misc http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial-of-service/
mlist
  • [oss-security] 20110218 CVE request: avahi daemon remote denial of service by sending NULL UDP
  • [oss-security] 20110218 Re: CVE request: avahi daemon remote denial of service by sending NULL UDP
  • [oss-security] 20110222 Re: [oss-security] CVE request: avahi daemon remote denial of service by sending NULL UDP
osvdb 70948
secunia
  • 43361
  • 43465
  • 43605
  • 43673
  • 44131
suse SUSE-SR:2011:005
ubuntu USN-1084-1
vupen
  • ADV-2011-0448
  • ADV-2011-0499
  • ADV-2011-0511
  • ADV-2011-0565
  • ADV-2011-0601
  • ADV-2011-0670
  • ADV-2011-0969
xf
  • avahi-udp-dos(65524)
  • avahi-udp-packet-dos(65525)
Last major update 11-02-2014 - 23:27
Published 22-02-2011 - 14:00
Last modified 16-08-2017 - 21:33
Back to Top