Описание
No description is available for this CVE.
Отчет
This flaw was found to be a duplicate of CVE-2017-6519. Please see https://access.redhat.com/security/cve/CVE-2017-6519 for information about affected products and security errata.
Меры по смягчению последствий
Ensure UDP port 5353 is blocked in the firewall. Moreover, configure correctly the rate limiting options based on your needs (see ratelimit-interval-usec and ratelimit-burst options in /etc/avahi/avahi-daemon.conf).
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | avahi | Not affected | ||
| Red Hat Enterprise Linux 6 | avahi | Not affected | ||
| Red Hat Enterprise Linux 7 | avahi | Not affected | ||
| Red Hat Enterprise Linux 8 | avahi | Not affected | ||
| Red Hat Virtualization 4 | redhat-virtualization-host | Not affected |
Показывать по
Дополнительная информация
5.3 Medium
CVSS3
Связанные уязвимости
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultID: CVE-2017-6519. Reason: This candidate is a duplicate of CVE-2017-6519. Notes: All CVE users should reference CVE-2017-6519 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultID: CVE-2017-6519. Reason: This candidate is a duplicate of CVE-2017-6519. Notes: All CVE users should reference CVE-2017-6519 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
5.3 Medium
CVSS3