
CVE-2023-38473 – Reachable assertion in avahi_alternative_host_name
https://notcve.org/view.php?id=CVE-2023-38473
02 Nov 2023 — A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function. Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_alternative_host_name(). Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. • https://access.redhat.com/security/cve/CVE-2023-38473 • CWE-617: Reachable Assertion •

CVE-2023-38472 – Reachable assertion in avahi_rdata_parse
https://notcve.org/view.php?id=CVE-2023-38472
02 Nov 2023 — A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function. Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_rdata_parse(). Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. • https://access.redhat.com/security/cve/CVE-2023-38472 • CWE-617: Reachable Assertion •

CVE-2023-38471 – Reachable assertion in dbus_set_host_name
https://notcve.org/view.php?id=CVE-2023-38471
02 Nov 2023 — A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function. Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función dbus_set_host_name. Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. • https://access.redhat.com/security/cve/CVE-2023-38471 • CWE-617: Reachable Assertion •

CVE-2023-38470 – Reachable assertion in avahi_escape_label
https://notcve.org/view.php?id=CVE-2023-38470
02 Nov 2023 — A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function. Se encontró una vulnerabilidad en Avahi. Existe una afirmación alcanzable en la función avahi_escape_label(). • https://access.redhat.com/security/cve/CVE-2023-38470 • CWE-617: Reachable Assertion •

CVE-2023-38469 – Reachable assertion in avahi_dns_packet_append_record
https://notcve.org/view.php?id=CVE-2023-38469
02 Nov 2023 — A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record. Se encontró una vulnerabilidad en Avahi, donde existe una afirmación alcanzable en avahi_dns_packet_append_record. Evgeny Vereshchagin discovered that Avahi contained several reachable assertions, which could lead to intentional assertion failures when specially crafted user input was given. An attacker could possibly use this issue to cause a denial of service. • https://access.redhat.com/security/cve/CVE-2023-38469 • CWE-617: Reachable Assertion •

CVE-2023-1981 – avahi: avahi-daemon can be crashed via DBus
https://notcve.org/view.php?id=CVE-2023-1981
26 May 2023 — A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash. USN-6129-1 fixed a vulnerability in Avahi. This update provides the corresponding update for Ubuntu 14.04 LTS, Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that Avahi incorrectly handled certain DBus messages. • https://access.redhat.com/security/cve/CVE-2023-1981 • CWE-400: Uncontrolled Resource Consumption •

CVE-2021-3468 – avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket
https://notcve.org/view.php?id=CVE-2021-3468
02 Jun 2021 — A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered. Se ha encontrado un fallo en avahi en versiones 0.6 hasta 0.8. El evento usado para señalar la terminación de la c... • https://bugzilla.redhat.com/show_bug.cgi?id=1939614 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2021-3502 – avahi: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames
https://notcve.org/view.php?id=CVE-2021-3502
07 May 2021 — A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability. Se encontró un fallo en avahi versión 0.8-5. Una aserción alcanzable está presente en la función avahi_s_host_name_resolver_start que permite a un atacante local bloquea... • https://bugzilla.redhat.com/show_bug.cgi?id=1946914 • CWE-476: NULL Pointer Dereference CWE-617: Reachable Assertion •

CVE-2021-26720
https://notcve.org/view.php?id=CVE-2021-26720
17 Feb 2021 — avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product. El archivo avahi-daemon-check-dns.sh en el paquete Debian avahi a versiones hasta 0.8-4, es ejecutado como root por medio d... • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982796 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2017-6519 – avahi: Multicast DNS responds to unicast queries outside of local network
https://notcve.org/view.php?id=CVE-2017-6519
01 May 2017 — avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809. avahi-daemon en Avahi, hasta las versiones 0.6.32 y 0.7, responde a consultas IPv6 unicast arbitrarias de manera inadver... • https://bugzilla.redhat.com/show_bug.cgi?id=1426712 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-346: Origin Validation Error •