avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-15575 avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
Ubuntu USN Ubuntu USN USN-3876-1 Avahi vulnerabilities
Ubuntu USN Ubuntu USN USN-3876-2 Avahi vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T15:33:20.149Z

Reserved: 2017-03-07T00:00:00

Link: CVE-2017-6519

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-01T01:59:00.297

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-6519

cve-icon Redhat

Severity : Low

Publid Date: 2015-03-31T00:00:00Z

Links: CVE-2017-6519 - Bugzilla

cve-icon OpenCVE Enrichment

No data.