First published: Sun Dec 31 2006(Updated: )
The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon | =0.6.7 | |
Avahi AutoIP Daemon | =0.6.8 | |
Avahi AutoIP Daemon | =0.6.9 | |
Avahi AutoIP Daemon | =0.6.10 | |
Avahi AutoIP Daemon | =0.6.11 | |
Avahi AutoIP Daemon | =0.6.12 | |
Avahi AutoIP Daemon | =0.6.13 | |
Avahi AutoIP Daemon | =0.6.14 | |
Avahi AutoIP Daemon | =0.6.15 | |
Avahi Utilities | =0.6.7 | |
Avahi Utilities | =0.6.8 | |
Avahi Utilities | =0.6.9 | |
Avahi Utilities | =0.6.10 | |
Avahi Utilities | =0.6.11 | |
Avahi Utilities | =0.6.12 | |
Avahi Utilities | =0.6.13 | |
Avahi Utilities | =0.6.14 | |
Avahi Utilities | =0.6.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6870 is classified as a denial of service vulnerability due to an infinite loop caused by a crafted DNS response.
To mitigate CVE-2006-6870, upgrade to Avahi version 0.6.16 or later.
CVE-2006-6870 affects Avahi versions 0.6.7 through 0.6.15.
The impact of CVE-2006-6870 is a denial of service that can cause the affected service to become unresponsive.
Yes, CVE-2006-6870 can be exploited remotely via a specially crafted DNS response.