First published: Tue Jan 04 2011(Updated: )
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi Avahi | =0.6.25 | |
Avahi Avahi | =0.6.5 | |
Avahi Avahi | =0.6.20 | |
Avahi Avahi | =0.6.19 | |
Avahi Avahi | =0.5.2 | |
Avahi Avahi | =0.6.1 | |
Avahi Avahi | =0.6.13 | |
Avahi Avahi | =0.6.15 | |
Avahi Avahi | =0.6.7 | |
Avahi Avahi | =0.6.17 | |
Avahi Avahi | =0.6.16 | |
Avahi Avahi | =0.3 | |
Avahi Avahi | <=0.6.28 | |
Avahi Avahi | =0.6.24 | |
Avahi Avahi | =0.6.23 | |
Avahi Avahi | =0.6.9 | |
Avahi Avahi | =0.2 | |
Avahi Avahi | =0.1 | |
Avahi Avahi | =0.6.14 | |
Avahi Avahi | =0.6.10 | |
Avahi Avahi | =0.6.27 | |
Avahi Avahi | =0.6.6 | |
Avahi Avahi | =0.5 | |
Avahi Avahi | =0.6.22 | |
Avahi Avahi | =0.6.4 | |
Avahi Avahi | =0.6.11 | |
Avahi Avahi | =0.6.3 | |
Avahi Avahi | =0.6.8 | |
Avahi Avahi | =0.6.18 | |
Avahi Avahi | =0.6.12 | |
Avahi Avahi | =0.4 | |
Avahi Avahi | =0.6.21 | |
Avahi Avahi | =0.6.2 | |
Avahi Avahi | =0.5.1 | |
Avahi Avahi | =0.6.26 | |
redhat/avahi | <0:0.6.16-10.el5_6 | 0:0.6.16-10.el5_6 |
redhat/avahi | <0:0.6.25-11.el6 | 0:0.6.25-11.el6 |
Fedoraproject Fedora | =15 | |
Redhat Enterprise Linux | =5.0 | |
Redhat Enterprise Linux | =6.0 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =10.10 | |
Debian Debian Linux | =5.0 | |
Debian Debian Linux | =6.0 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.