Fedora 14 : avahi-0.6.27-8.fc14 (2011-11588)

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

Fixes CVE-2011-1002.

The MITRE CVE dictionary describes this issue as :

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows
remote attackers to cause a denial of service (infinite loop) via an
empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this
vulnerability exists because of an incorrect fix for CVE-2010-2244.

Find out more about CVE-2011-1002 from the MITRE CVE dictionary and
NIST NVD.

This also disables gtk3 support. Unfortunately gtk3 support in F14 is
broken and Avahi cannot be compiled against it. Since gtk3 will not be
fixed in F14 anymore and nobody uses it we instead disable it in
Avahi.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=667187
http://www.nessus.org/u?0a8e18cd

Solution :

Update the affected avahi package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 56151 ()

Bugtraq ID: 46446

CVE ID: CVE-2010-2244
CVE-2011-1002

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now