CVE-2017-6519
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2017
Last modified:
20/04/2025
Description
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Base Score 2.0
6.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* | 0.6.32 (including) | |
cpe:2.3:a:avahi:avahi:0.7:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugzilla.redhat.com/show_bug.cgi?id=1426712
- https://github.com/lathiat/avahi/issues/203
- https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://usn.ubuntu.com/3876-1/
- https://usn.ubuntu.com/3876-2/
- https://www.secfu.net/advisories
- https://bugzilla.redhat.com/show_bug.cgi?id=1426712
- https://github.com/lathiat/avahi/issues/203
- https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
- https://usn.ubuntu.com/3876-1/
- https://usn.ubuntu.com/3876-2/
- https://www.secfu.net/advisories