First published: Wed Mar 10 2021(Updated: )
A flaw was found in avahi deamon. Denial of service can be triggered by writing long lines to /run/avahi-daemon/socket resulting in an unresponsive busy-loop of the daemon. References: <a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984938">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984938</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi Avahi | >=0.6<=0.8 | |
Debian Debian Linux | =9.0 | |
debian/avahi | <=0.7-4<=0.8-5 | 0.8-7 0.8-5+deb11u2 |
debian/avahi | 0.8-5+deb11u2 0.8-10 0.8-13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3468 is a vulnerability found in avahi versions 0.6 up to 0.8 where a flaw in how the termination of the client connection on the avahi Unix socket is handled can allow a local attacker to trigger an infinite loop.
The severity of CVE-2021-3468 is medium with a CVSS v3 base score of 5.5.
Versions 0.6 up to 0.8 of avahi are affected by CVE-2021-3468.
A local attacker can exploit CVE-2021-3468 by triggering an infinite loop through the mishandling of the client connection termination event on the avahi Unix socket.
Yes, there are fixes and patches available for CVE-2021-3468. It is recommended to update to a version of avahi that is not affected by this vulnerability.