First published: Fri Nov 15 2024(Updated: )
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52615 is categorized as a medium severity vulnerability due to its potential for DNS spoofing attacks.
To mitigate CVE-2024-52615, you should update the Avahi-daemon to the latest version that addresses this vulnerability.
CVE-2024-52615 affects systems running the Avahi-daemon, particularly those using fixed source ports for wide-area DNS queries.
CVE-2024-52615 is associated with DNS spoofing attacks that exploit fixed source ports used by Avahi-daemon for DNS queries.
CVE-2024-52615 was identified in early 2024, raising awareness of its implications for system security.