Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-1176

Опубликовано: 06 апр. 2020
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2020-1176: avahi security update (LOW)

[0.6.31-20]

  • multicast DNS no longer responds to unicast queries outside of local network (#1663410)

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

avahi

0.6.31-20.el7

avahi-autoipd

0.6.31-20.el7

avahi-compat-howl

0.6.31-20.el7

avahi-compat-howl-devel

0.6.31-20.el7

avahi-compat-libdns_sd

0.6.31-20.el7

avahi-compat-libdns_sd-devel

0.6.31-20.el7

avahi-devel

0.6.31-20.el7

avahi-dnsconfd

0.6.31-20.el7

avahi-glib

0.6.31-20.el7

avahi-glib-devel

0.6.31-20.el7

avahi-gobject

0.6.31-20.el7

avahi-gobject-devel

0.6.31-20.el7

avahi-libs

0.6.31-20.el7

avahi-qt3

0.6.31-20.el7

avahi-qt3-devel

0.6.31-20.el7

avahi-qt4

0.6.31-20.el7

avahi-qt4-devel

0.6.31-20.el7

avahi-tools

0.6.31-20.el7

avahi-ui

0.6.31-20.el7

avahi-ui-devel

0.6.31-20.el7

avahi-ui-gtk3

0.6.31-20.el7

avahi-ui-tools

0.6.31-20.el7

Oracle Linux x86_64

avahi

0.6.31-20.el7

avahi-autoipd

0.6.31-20.el7

avahi-compat-howl

0.6.31-20.el7

avahi-compat-howl-devel

0.6.31-20.el7

avahi-compat-libdns_sd

0.6.31-20.el7

avahi-compat-libdns_sd-devel

0.6.31-20.el7

avahi-devel

0.6.31-20.el7

avahi-dnsconfd

0.6.31-20.el7

avahi-glib

0.6.31-20.el7

avahi-glib-devel

0.6.31-20.el7

avahi-gobject

0.6.31-20.el7

avahi-gobject-devel

0.6.31-20.el7

avahi-libs

0.6.31-20.el7

avahi-qt3

0.6.31-20.el7

avahi-qt3-devel

0.6.31-20.el7

avahi-qt4

0.6.31-20.el7

avahi-qt4-devel

0.6.31-20.el7

avahi-tools

0.6.31-20.el7

avahi-ui

0.6.31-20.el7

avahi-ui-devel

0.6.31-20.el7

avahi-ui-gtk3

0.6.31-20.el7

avahi-ui-tools

0.6.31-20.el7

Связанные CVE

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 8 лет назад

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

CVSS3: 5.8
redhat
около 10 лет назад

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

CVSS3: 9.1
nvd
около 8 лет назад

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

CVSS3: 9.1
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.1
debian
около 8 лет назад

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to ...