Computer Security
[EN] securityvulns.ru no-pyccku


Avahi DNS server DoS
updated since 05.08.2010
Published:24.02.2011
Source:
SecurityVulns ID:11035
Type:remote
Threat Level:
5/10
Description:Crash on malformed DNS packet parsing.
Affected:AVAHI : Avahi 0.6
CVE:CVE-2011-1002 (avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.)
 CVE-2010-2244 (The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:037 ] avahi (24.02.2011)
 documentDEBIAN, [SECURITY] [DSA 2086-1] New avahi packages fix denial of service (05.08.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod