First published: Fri Nov 15 2024(Updated: )
The sequential increment of DNS transaction IDs makes Avahi vulnerable to DNS spoofing, allowing attackers to inject malicious DNS records. This can compromise the integrity of DNS responses, redirecting users to potentially harmful domains. This vulnerability poses a greater risk as it directly undermines the integrity of DNS resolution, affecting all systems using Avahi for wide-area DNS queries unless mitigations are applied.
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2326429 is high due to its potential for facilitating DNS spoofing attacks.
To fix REDHAT-BUG-2326429, update Avahi to the latest version that addresses this vulnerability.
REDHAT-BUG-2326429 affects systems running the Avahi service.
Yes, REDHAT-BUG-2326429 can lead to data compromise by allowing attackers to redirect users to malicious domains.
Exploiting REDHAT-BUG-2326429 allows attackers to inject malicious DNS records, compromising the integrity of DNS responses.