Avahi

Avahi

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 02.11.2023 15:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:24

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.

  • EPSS 0.01%
  • Veröffentlicht 02.11.2023 15:15:08
  • Zuletzt bearbeitet 03.11.2025 22:16:24

A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 26.05.2023 18:15:11
  • Zuletzt bearbeitet 03.11.2025 22:16:03

A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.

  • EPSS 0.01%
  • Veröffentlicht 02.06.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:36

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loo...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 07.05.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:21:41

A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invali...

  • EPSS 0.07%
  • Veröffentlicht 17.02.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:44

avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files unde...

Exploit
  • EPSS 1.13%
  • Veröffentlicht 01.05.2017 01:59:00
  • Zuletzt bearbeitet 03.12.2025 22:15:49

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leaka...

Exploit
  • EPSS 71.38%
  • Veröffentlicht 22.02.2011 19:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect f...

  • EPSS 1.3%
  • Veröffentlicht 08.07.2010 12:54:47
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet ...

  • EPSS 75.37%
  • Veröffentlicht 17.12.2008 02:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an as...