Mandriva Linux Security Advisory : avahi (MDVSA-2010:204)

medium Nessus Plugin ID 49989

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability was discovered and corrected in avahi :

The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081 (CVE-2010-2244).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90

The updated packages have been patched to correct this issue.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 49989

File Name: mandriva_MDVSA-2010-204.nasl

Version: 1.13

Type: local

Published: 10/15/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:avahi, p-cpe:/a:mandriva:linux:avahi-dnsconfd, p-cpe:/a:mandriva:linux:avahi-python, p-cpe:/a:mandriva:linux:avahi-sharp, p-cpe:/a:mandriva:linux:avahi-sharp-doc, p-cpe:/a:mandriva:linux:avahi-x11, p-cpe:/a:mandriva:linux:lib64avahi-client-devel, p-cpe:/a:mandriva:linux:lib64avahi-client3, p-cpe:/a:mandriva:linux:lib64avahi-common-devel, p-cpe:/a:mandriva:linux:lib64avahi-common3, p-cpe:/a:mandriva:linux:lib64avahi-compat-howl-devel, p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0, p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd-devel, p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1, p-cpe:/a:mandriva:linux:lib64avahi-core-devel, p-cpe:/a:mandriva:linux:lib64avahi-core5, p-cpe:/a:mandriva:linux:lib64avahi-core6, p-cpe:/a:mandriva:linux:lib64avahi-glib-devel, p-cpe:/a:mandriva:linux:lib64avahi-glib1, p-cpe:/a:mandriva:linux:lib64avahi-gobject-devel, p-cpe:/a:mandriva:linux:lib64avahi-gobject0, p-cpe:/a:mandriva:linux:lib64avahi-qt3-devel, p-cpe:/a:mandriva:linux:lib64avahi-qt3_1, p-cpe:/a:mandriva:linux:lib64avahi-qt4-devel, p-cpe:/a:mandriva:linux:lib64avahi-qt4_1, p-cpe:/a:mandriva:linux:lib64avahi-ui-devel, p-cpe:/a:mandriva:linux:lib64avahi-ui1, p-cpe:/a:mandriva:linux:libavahi-client-devel, p-cpe:/a:mandriva:linux:libavahi-client3, p-cpe:/a:mandriva:linux:libavahi-common-devel, p-cpe:/a:mandriva:linux:libavahi-common3, p-cpe:/a:mandriva:linux:libavahi-compat-howl-devel, p-cpe:/a:mandriva:linux:libavahi-compat-howl0, p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd-devel, p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1, p-cpe:/a:mandriva:linux:libavahi-core-devel, p-cpe:/a:mandriva:linux:libavahi-core5, p-cpe:/a:mandriva:linux:libavahi-core6, p-cpe:/a:mandriva:linux:libavahi-glib-devel, p-cpe:/a:mandriva:linux:libavahi-glib1, p-cpe:/a:mandriva:linux:libavahi-gobject-devel, p-cpe:/a:mandriva:linux:libavahi-gobject0, p-cpe:/a:mandriva:linux:libavahi-qt3-devel, p-cpe:/a:mandriva:linux:libavahi-qt3_1, p-cpe:/a:mandriva:linux:libavahi-qt4-devel, p-cpe:/a:mandriva:linux:libavahi-qt4_1, p-cpe:/a:mandriva:linux:libavahi-ui-devel, p-cpe:/a:mandriva:linux:libavahi-ui1, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2009.1, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/14/2010

Reference Information

CVE: CVE-2010-2244

BID: 41075

MDVSA: 2010:204