Описание
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | avahi | Affected | ||
Red Hat Enterprise Linux 7 | avahi | Out of support scope | ||
Red Hat Enterprise Linux 8 | avahi | Will not fix | ||
Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred | ||
Red Hat Enterprise Linux 9 | avahi | Fixed | RHSA-2025:11402 | 21.07.2025 |
Red Hat Enterprise Linux 9 | avahi | Fixed | RHSA-2025:11402 | 21.07.2025 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-330
https://bugzilla.redhat.com/show_bug.cgi?id=2326418avahi: Avahi Wide-Area DNS Uses Constant Source Port
EPSS
Процентиль: 24%
0.00079
Низкий
5.3 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.3
ubuntu
9 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
CVSS3: 5.3
nvd
9 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
CVSS3: 5.3
debian
9 месяцев назад
A flaw was found in Avahi-daemon, which relies on fixed source ports f ...
EPSS
Процентиль: 24%
0.00079
Низкий
5.3 Medium
CVSS3