SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Avahi Vendors:   avahi.org
Avahi Multicast DNS Packet Processing Error in AvahiDnsPacket() Lets Remote Users Deny Service
SecurityTracker Alert ID:  1024200
SecurityTracker URL:  http://securitytracker.com/id/1024200
CVE Reference:   CVE-2010-2244   (Links to External Site)
Date:  Jul 14 2010
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 0.6.27
Description:   A vulnerability was reported in Avahi. A remote user can cause denial of service conditions.

A remote user can send a specially crafted multicast DNS packet with an invalid checksum followed by a multicast DNS packet with a valid checksum to trigger an assertion and cause the target service to crash.

The vulnerability resides in the AvahiDnsPacket() function in 'avahi-core/socket.c'.

Ludwig Nussel reported this vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fix (0.6.27).
Vendor URL:  avahi.org/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 14 2010 (Red Hat Issues Fix) Avahi Multicast DNS Packet Processing Error in AvahiDnsPacket() Lets Remote Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 5.
May 20 2011 (Red Hat Issues Fix) Avahi Multicast DNS Packet Processing Error in AvahiDnsPacket() Lets Remote Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC