CVE-2017-6519
Published: 30 April 2017
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Mitigation
Block udp port 5353 at perimeter firewall
Priority
Status
Package | Release | Status |
---|---|---|
avahi Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Released
(0.7-3.1ubuntu1.2)
|
|
cosmic |
Released
(0.7-4ubuntu2.1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(0.6.31-4ubuntu1.3)
|
|
upstream |
Released
(0.8)
|
|
xenial |
Released
(0.6.32~rc+dfsg-1ubuntu2.3)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
Patches: upstream: https://github.com/lathiat/avahi/commit/e111def44a7df4624a4aa3f85fe98054bffb6b4f |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |