CVE Vulnerabilities

CVE-2017-6519

Origin Validation Error

Published: May 01, 2017 | Modified: Nov 07, 2023
CVSS 3.x
9.1
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:P
RedHat/V2
RedHat/V3
5.8 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Ubuntu
LOW

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

Weakness

The product does not properly verify that the source of data or communication is valid.

Affected Software

Name Vendor Start Version End Version
Avahi Avahi * 0.6.32 (including)
Avahi Avahi 0.7 (including) 0.7 (including)
Red Hat Enterprise Linux 7 RedHat avahi-0:0.6.31-20.el7 *
Avahi Ubuntu artful *
Avahi Ubuntu bionic *
Avahi Ubuntu cosmic *
Avahi Ubuntu devel *
Avahi Ubuntu precise *
Avahi Ubuntu trusty *
Avahi Ubuntu upstream *
Avahi Ubuntu vivid/stable-phone-overlay *
Avahi Ubuntu xenial *
Avahi Ubuntu yakkety *
Avahi Ubuntu zesty *

References