CVE-2017-6519

critical

Description

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

References

https://bugzilla.redhat.com/show_bug.cgi?id=1426712

https://github.com/lathiat/avahi/issues/203

https://github.com/lathiat/avahi/issues/203#issuecomment-449536790

https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E

https://usn.ubuntu.com/3876-1/

https://usn.ubuntu.com/3876-2/

https://www.secfu.net/advisories

Details

Source: MITRE

Published: 2017-05-01

Updated: 2020-07-29

Type: CWE-346

Risk Information

CVSS v2

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Impact Score: 5.2

Exploitability Score: 3.9

Severity: CRITICAL