Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-52616

Опубликовано: 21 нояб. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.3

Описание

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

РелизСтатусПримечание
devel

pending

0.8-18ubuntu1
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needed

esm-infra/focal

needed

esm-infra/xenial

needed

focal

ignored

end of standard support, was deferred [2025-05-26]
jammy

needed

noble

needed

oracular

ignored

end of life, was deferred
plucky

ignored

end of life, was deferred

Показывать по

EPSS

Процентиль: 24%
0.00083
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
nvd
больше 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS3: 5.3
msrc
около 1 года назад

Avahi: avahi wide-area dns predictable transaction ids

CVSS3: 5.3
debian
больше 1 года назад

A flaw was found in the Avahi-daemon, where it initializes DNS transac ...

suse-cvrf
больше 1 года назад

Security update for avahi

EPSS

Процентиль: 24%
0.00083
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2024-52616