Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-0758
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-03 Mar, 2009 | 16:30
Updated At-12 Aug, 2010 | 14:13

The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

avahi
avahi
>>avahi-daemon>>0.6.23
cpe:2.3:a:avahi:avahi-daemon:0.6.23:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2010-07-13T00:00:00

This issue has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2010-0528.html.

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683cve@mitre.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.htmlcve@mitre.org
N/A
http://secunia.com/advisories/38420cve@mitre.org
N/A
http://www.debian.org/security/2010/dsa-2086cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:076cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2009/03/02/1cve@mitre.org
N/A
http://www.securityfocus.com/bid/33946cve@mitre.org
N/A
Change History
0Changes found

Details not found