First published: Fri Feb 24 2017(Updated: )
It was found that avahi responds to unicast queries coming from outside of local network which may cause an information leak, such as disclosing the device type/model that responds to the request or the operating system. The mDNS response may also be used to amplify denial of service attacks against other networks as the response size is greater than the size of request. External References: <a href="https://www.kb.cert.org/vuls/id/550620">https://www.kb.cert.org/vuls/id/550620</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1426712 is considered high due to the potential for information leaks and amplification of denial of service attacks.
To fix REDHAT-BUG-1426712, it is recommended to restrict mDNS responses to the local network.
REDHAT-BUG-1426712 could lead to unauthorized information disclosure about device types and operating systems, as well as increased vulnerability to denial of service attacks.
The vulnerable software associated with REDHAT-BUG-1426712 is Avahi.
A potential workaround for REDHAT-BUG-1426712 includes disabling mDNS if not needed for device discovery.