RHEL 5 : avahi (RHSA-2009:0013)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated avahi packages that fix a security issue are now available for
Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Avahi is an implementation of the DNS Service Discovery and Multicast
DNS specifications for Zeroconf Networking. It facilitates service
discovery on a local network. Avahi and Avahi-aware applications allow
you to plug your computer into a network and, with no configuration,
view other people to chat with, see printers to print to, and find
shared files on other computers.

Hugo Dias discovered a denial of service flaw in avahi-daemon. A
remote attacker on the same local area network (LAN) could send a
specially crafted mDNS (Multicast DNS) packet that would cause
avahi-daemon to exit unexpectedly due to a failed assertion check.

All users are advised to upgrade to these updated packages, which
contain a backported patch which resolves this issue. After installing
the update, avahi-daemon will be restarted automatically.

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 35358 ()

Bugtraq ID: 32825

CVE ID: CVE-2008-5081

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now