Avahi

Avahi

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 24.01.2026 01:25:02
  • Zuletzt bearbeitet 26.01.2026 15:03:33

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions 0.9rc2 and below, avahi-daemon can be crashed via a segmentation fault by sending an unsolicited mDNS response containing a recur...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 12.01.2026 17:39:57
  • Zuletzt bearbeitet 16.01.2026 16:53:04

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.

  • EPSS 0.03%
  • Veröffentlicht 12.01.2026 17:38:10
  • Zuletzt bearbeitet 16.01.2026 16:52:04

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to res...

  • EPSS 0.01%
  • Veröffentlicht 12.01.2026 17:31:49
  • Zuletzt bearbeitet 16.01.2026 16:51:03

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVA...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 18.12.2025 20:25:31
  • Zuletzt bearbeitet 16.01.2026 16:50:20

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, al...

  • EPSS 0.09%
  • Veröffentlicht 21.11.2024 21:15:24
  • Zuletzt bearbeitet 14.05.2025 00:15:17

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transacti...

  • EPSS 0.07%
  • Veröffentlicht 21.11.2024 21:15:23
  • Zuletzt bearbeitet 23.09.2025 10:15:34

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

  • EPSS 0.01%
  • Veröffentlicht 02.11.2023 16:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:24

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.

  • EPSS 0.01%
  • Veröffentlicht 02.11.2023 15:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:24

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.

  • EPSS 0.01%
  • Veröffentlicht 02.11.2023 15:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:24

A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.