A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | Avahi: avahi wide-area dns predictable transaction ids |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Sat, 16 Nov 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | |
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | |
Weaknesses | CWE-334 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-11-21T20:41:11.636Z
Updated: 2024-11-24T21:11:52.262Z
Reserved: 2024-11-15T08:38:03.183Z
Link: CVE-2024-52616
Vulnrichment
Updated: 2024-11-21T21:07:25.594Z
NVD
Status : Received
Published: 2024-11-21T21:15:24.140
Modified: 2024-11-21T21:15:24.140
Link: CVE-2024-52616
Redhat