A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Nov 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | avahi: Avahi Wide-Area DNS Uses Constant Source Port | Avahi: avahi wide-area dns uses constant source port |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Sat, 16 Nov 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected. | |
Title | avahi: Avahi Wide-Area DNS Uses Constant Source Port | |
Weaknesses | CWE-330 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-11-21T20:34:00.981Z
Updated: 2024-11-24T21:11:51.283Z
Reserved: 2024-11-15T08:38:03.183Z
Link: CVE-2024-52615
Vulnrichment
Updated: 2024-11-21T21:07:23.260Z
NVD
Status : Received
Published: 2024-11-21T21:15:23.807
Modified: 2024-11-21T21:15:23.807
Link: CVE-2024-52615
Redhat