Joined: 12 May 2004
|Posted: Fri Apr 10, 2009 1:26 pm Post subject: [ GLSA 200904-10 ] Avahi: Denial of Service
|Gentoo Linux Security Advisory
Title: Avahi: Denial of Service (GLSA 200904-10)
Date: April 08, 2009
An error in Avahi might lead to a Denial of Service via network and CPU
Avahi is a system that facilitates service discovery on a local
Vulnerable: < 0.6.24-r2
Unaffected: >= 0.6.24-r2
Architectures: All supported architectures
Rob Leslie reported that the
originates_from_local_legacy_unicast_socket() function in
avahi-core/server.c does not account for the network byte order of a
port number when processing incoming multicast packets, leading to a
multicast packet storm.
A remote attacker could send specially crafted legacy unicast mDNS
query packets to the Avahi daemon, resulting in a Denial of Service due
to network bandwidth and CPU consumption.
There is no known workaround at this time.
All Avahi users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.24-r2"
Last edited by GLSA on Mon Jun 10, 2013 4:30 am; edited 6 times in total