Описание
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | pending | 0.8-18ubuntu1 |
| esm-infra-legacy/trusty | needs-triage | |
| esm-infra/bionic | needed | |
| esm-infra/focal | needed | |
| esm-infra/xenial | needed | |
| focal | ignored | end of standard support, was deferred [2025-05-26] |
| jammy | needed | |
| noble | needed | |
| oracular | ignored | end of life, was deferred |
| plucky | ignored | end of life, was deferred |
Показывать по
EPSS
5.3 Medium
CVSS3
Связанные уязвимости
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Avahi: avahi wide-area dns predictable transaction ids
A flaw was found in the Avahi-daemon, where it initializes DNS transac ...
EPSS
5.3 Medium
CVSS3