First published: Thu Dec 11 2008(Updated: )
Hugo Dias of the Synchron Security Labs discovered a remote denial of service flaw in the avahi daemon. A crafted multicast DNS (mDNS) packet with source port 0 can trigger assertion in originates_from_local_legacy_unicast_socket() function in avahi-core/server.c -- assert(port > 0); -- causing the daemon to call abort() and exit unexpectedly. Scope of this attack is usually limited to a single LAN.
Affected Software | Affected Version | How to fix |
---|---|---|
Avahi AutoIP Daemon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-475964 is classified as a remote denial of service vulnerability.
To fix REDHAT-BUG-475964, update the avahi-daemon to the latest patched version available.
REDHAT-BUG-475964 affects the avahi-daemon, specifically the handling of multicast DNS packets.
Yes, REDHAT-BUG-475964 can be exploited remotely by sending a crafted multicast DNS packet.
Versions of avahi-daemon prior to the latest update that addresses this issue are vulnerable to REDHAT-BUG-475964.