Page 3 of 16 results (0.009 seconds)

CVSS: 5.0EPSS: 95%CPEs: 30EXPL: 1

The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure. La función originates_from_local_legacy_unicast_socket (avahi-core/server.c)en avahi-daemon en Avahi anterior a v0.6.24 permite a atacantes remotos producir una denegación de servicio (caída) a través de un paquete mDNS manipulado con un puerto de origen de 0, que dispara un fallo de evaluación. Avahi-daemon versions prior to 0.6.24 can be DoSd with an mDNS packet with a source port of 0. • https://www.exploit-db.com/exploits/7520 http://avahi.org/milestone/Avahi%200.6.24 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://secunia.com/advisories/33153 http://secunia.com/advisories/33220 http://secunia.com/advisories/33279 http://secunia.com/advisories/33475 http://security.gentoo.org/glsa/glsa-200901-11.xml http://www.debian.org/security/2008/dsa-1690 http://www.openwall.com/lists/oss-security/2008/12/14/1 http://www • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 3%CPEs: 1EXPL: 0

The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error. El demonio Avahi en Avahi versiones anteriores a 0.6.20 permite a atacantes provocar una denegación de servicio (salida) mediante datos TXT vacíos a través de D-Bus, que dispara un error de aserción. • http://avahi.org/changeset/1482 http://avahi.org/milestone/Avahi%200.6.20 http://osvdb.org/37507 http://secunia.com/advisories/25811 http://secunia.com/advisories/26083 http://secunia.com/advisories/26791 http://secunia.com/advisories/33220 http://secunia.com/advisories/33279 http://www.debian.org/security/2008/dsa-1690 http://www.mandriva.com/security/advisories?name=MDKSA-2007:185 http://www.novell.com/linux/security/advisories/2007_14_sr.html http://www.sec •

CVSS: 5.0EPSS: 12%CPEs: 9EXPL: 0

The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself. La función consume_labels en avahi-core/dns.c en Avahi before 0.6.16 permite a un atacante remoto provocar denegación de servicio (bucle infinito) a través de respuestas DNS comprimidas manipuladas con una etiqueta que apunta así misma. • http://fedoranews.org/cms/node/2362 http://fedoranews.org/cms/node/2408 http://secunia.com/advisories/23628 http://secunia.com/advisories/23644 http://secunia.com/advisories/23660 http://secunia.com/advisories/23673 http://secunia.com/advisories/23782 http://secunia.com/advisories/24995 http://www.avahi.org/#December2006 http://www.avahi.org/changeset/1340 http://www.avahi.org/ticket/84 http://www.mandriva.com/security/advisories?name=MDKSA-2007:003 http:// •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi. Avahi anterior a 0.6.15 no verifica la identidad del remitente de mensajes netlink para asegurar que provienen del núcleo en lugar que de otro proceso, lo cual permite a usuarios locales suplantar cambios de red en Avahi. • http://avahi.org/milestone/Avahi%200.6.15 http://secunia.com/advisories/22807 http://secunia.com/advisories/22852 http://secunia.com/advisories/22932 http://secunia.com/advisories/23020 http://secunia.com/advisories/23042 http://securitytracker.com/id?1017257 http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml http://www.mandriva.com/security/advisories?name=MDKSA-2006:215 http://www.novell.com/linux/security/advisories/2006_26_sr.html http://www.securityfocus.com& •

CVSS: 3.6EPSS: 0%CPEs: 3EXPL: 0

Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts. • http://0pointer.de/cgi-bin/viewcvs.cgi/%2Acheckout%2A/trunk/docs/NEWS?root=avahi http://secunia.com/advisories/20022 http://secunia.com/advisories/20215 http://www.novell.com/linux/security/advisories/2006_05_19.html http://www.securityfocus.com/bid/17884 https://exchange.xforce.ibmcloud.com/vulnerabilities/26330 •