CVE Vulnerabilities

CVE-2017-6519

Origin Validation Error

Published: May 01, 2017 | Modified: Dec 03, 2025
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
5.8 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

Weakness

The product does not properly verify that the source of data or communication is valid.

Affected Software

NameVendorStart VersionEnd Version
AvahiAvahi*0.6.32 (including)
AvahiAvahi0.7 (including)0.7 (including)
Red Hat Enterprise Linux 7RedHatavahi-0:0.6.31-20.el7*
AvahiUbuntuartful*
AvahiUbuntubionic*
AvahiUbuntucosmic*
AvahiUbuntudevel*
AvahiUbuntuesm-infra-legacy/trusty*
AvahiUbuntuesm-infra/bionic*
AvahiUbuntuesm-infra/xenial*
AvahiUbuntuprecise*
AvahiUbuntutrusty*
AvahiUbuntutrusty/esm*
AvahiUbuntuupstream*
AvahiUbuntuvivid/stable-phone-overlay*
AvahiUbuntuxenial*
AvahiUbuntuyakkety*
AvahiUbuntuzesty*

References