Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown

CVE-2011-1002

Disclosure Date: February 22, 2011 (last updated December 23, 2023)
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
5
Attacker Value
Unknown

CVE-2023-38473

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
Attacker Value
Unknown

CVE-2023-38472

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
Attacker Value
Unknown

CVE-2023-38471

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
Attacker Value
Unknown

CVE-2023-38470

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
Attacker Value
Unknown

CVE-2023-38469

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
Attacker Value
Unknown

CVE-2023-1981

Disclosure Date: May 26, 2023 (last updated October 08, 2023)
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
Attacker Value
Unknown

CVE-2021-3468

Disclosure Date: June 02, 2021 (last updated November 28, 2024)
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
Attacker Value
Unknown

CVE-2021-3502

Disclosure Date: May 07, 2021 (last updated November 08, 2023)
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Attacker Value
Unknown

CVE-2021-26720

Disclosure Date: February 17, 2021 (last updated November 28, 2024)
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.