First published: Fri Nov 15 2024(Updated: )
This vulnerability exposes Avahi-daemon to potential DNS spoofing attacks by using a fixed source port for queries. However, the impact is limited because it only affects wide-area DNS and can be mitigated by forwarding queries to local DNS resolvers (e.g., systemd-resolved), which provide better randomization. The impact is primarily on systems actively using wide-area DNS, with .local mDNS being unaffected.
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2326418 is considered moderate due to its limited impact on wide-area DNS.
To mitigate REDHAT-BUG-2326418, forward DNS queries to local DNS resolvers like systemd-resolved.
REDHAT-BUG-2326418 affects systems running the Avahi-daemon service.
Yes, REDHAT-BUG-2326418 can expose systems to DNS spoofing attacks if not mitigated properly.
The nature of the vulnerability in REDHAT-BUG-2326418 involves the use of a fixed source port for DNS queries.