Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-52616

Опубликовано: 21 нояб. 2024
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
avahifixed0.8-18package
avahino-dsatrixiepackage
avahino-dsabookwormpackage
avahipostponedbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2326429

  • https://github.com/avahi/avahi/issues/254

  • https://github.com/avahi/avahi/issues/254#issuecomment-2480519212

  • turn off wide-area feature: https://github.com/avahi/avahi/pull/577

  • Revisiting of feature: https://github.com/avahi/avahi/issues/578

  • https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm

  • Mitiated by default since avahi/0.8-17 with enable-wide-area=no

EPSS

Процентиль: 24%
0.00083
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
redhat
около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
nvd
около 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
msrc
12 месяцев назад

Описание отсутствует

suse-cvrf
около 1 года назад

Security update for avahi

EPSS

Процентиль: 24%
0.00083
Низкий