Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3468

Опубликовано: 02 июн. 2021
Источник: debian
EPSS Низкий

Описание

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
avahifixed0.8-7package
avahifixed0.8-5+deb11u2bullseyepackage

Примечания

  • https://github.com/avahi/avahi/pull/330

  • https://github.com/avahi/avahi/commit/447affe29991ee99c6b9732fc5f2c1048a611d3b

  • https://bugzilla.redhat.com/show_bug.cgi?id=1939614#c3

  • https://github.com/avahi/avahi/security/advisories/GHSA-mrwc-c54v-3rg8

EPSS

Процентиль: 1%
0.0001
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 4 лет назад

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

CVSS3: 6.2
redhat
больше 4 лет назад

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

CVSS3: 5.5
nvd
около 4 лет назад

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

CVSS3: 5.5
msrc
больше 3 лет назад

Описание отсутствует

suse-cvrf
около 4 лет назад

Security update for avahi

EPSS

Процентиль: 1%
0.0001
Низкий