CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
93.7%
Issue Overview:
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809. (CVE-2017-6519)
Affected Packages:
avahi
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update avahi to update your system.
New Packages:
aarch64:
avahi-0.6.31-20.amzn2.aarch64
avahi-tools-0.6.31-20.amzn2.aarch64
avahi-ui-tools-0.6.31-20.amzn2.aarch64
avahi-glib-0.6.31-20.amzn2.aarch64
avahi-glib-devel-0.6.31-20.amzn2.aarch64
avahi-gobject-0.6.31-20.amzn2.aarch64
avahi-gobject-devel-0.6.31-20.amzn2.aarch64
avahi-ui-0.6.31-20.amzn2.aarch64
avahi-ui-gtk3-0.6.31-20.amzn2.aarch64
avahi-ui-devel-0.6.31-20.amzn2.aarch64
avahi-qt3-0.6.31-20.amzn2.aarch64
avahi-qt3-devel-0.6.31-20.amzn2.aarch64
avahi-qt4-0.6.31-20.amzn2.aarch64
avahi-qt4-devel-0.6.31-20.amzn2.aarch64
avahi-libs-0.6.31-20.amzn2.aarch64
avahi-devel-0.6.31-20.amzn2.aarch64
avahi-compat-howl-0.6.31-20.amzn2.aarch64
avahi-compat-howl-devel-0.6.31-20.amzn2.aarch64
avahi-compat-libdns_sd-0.6.31-20.amzn2.aarch64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.aarch64
avahi-autoipd-0.6.31-20.amzn2.aarch64
avahi-dnsconfd-0.6.31-20.amzn2.aarch64
avahi-debuginfo-0.6.31-20.amzn2.aarch64
i686:
avahi-0.6.31-20.amzn2.i686
avahi-tools-0.6.31-20.amzn2.i686
avahi-ui-tools-0.6.31-20.amzn2.i686
avahi-glib-0.6.31-20.amzn2.i686
avahi-glib-devel-0.6.31-20.amzn2.i686
avahi-gobject-0.6.31-20.amzn2.i686
avahi-gobject-devel-0.6.31-20.amzn2.i686
avahi-ui-0.6.31-20.amzn2.i686
avahi-ui-gtk3-0.6.31-20.amzn2.i686
avahi-ui-devel-0.6.31-20.amzn2.i686
avahi-qt3-0.6.31-20.amzn2.i686
avahi-qt3-devel-0.6.31-20.amzn2.i686
avahi-qt4-0.6.31-20.amzn2.i686
avahi-qt4-devel-0.6.31-20.amzn2.i686
avahi-libs-0.6.31-20.amzn2.i686
avahi-devel-0.6.31-20.amzn2.i686
avahi-compat-howl-0.6.31-20.amzn2.i686
avahi-compat-howl-devel-0.6.31-20.amzn2.i686
avahi-compat-libdns_sd-0.6.31-20.amzn2.i686
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.i686
avahi-autoipd-0.6.31-20.amzn2.i686
avahi-dnsconfd-0.6.31-20.amzn2.i686
avahi-debuginfo-0.6.31-20.amzn2.i686
src:
avahi-0.6.31-20.amzn2.src
x86_64:
avahi-0.6.31-20.amzn2.x86_64
avahi-tools-0.6.31-20.amzn2.x86_64
avahi-ui-tools-0.6.31-20.amzn2.x86_64
avahi-glib-0.6.31-20.amzn2.x86_64
avahi-glib-devel-0.6.31-20.amzn2.x86_64
avahi-gobject-0.6.31-20.amzn2.x86_64
avahi-gobject-devel-0.6.31-20.amzn2.x86_64
avahi-ui-0.6.31-20.amzn2.x86_64
avahi-ui-gtk3-0.6.31-20.amzn2.x86_64
avahi-ui-devel-0.6.31-20.amzn2.x86_64
avahi-qt3-0.6.31-20.amzn2.x86_64
avahi-qt3-devel-0.6.31-20.amzn2.x86_64
avahi-qt4-0.6.31-20.amzn2.x86_64
avahi-qt4-devel-0.6.31-20.amzn2.x86_64
avahi-libs-0.6.31-20.amzn2.x86_64
avahi-devel-0.6.31-20.amzn2.x86_64
avahi-compat-howl-0.6.31-20.amzn2.x86_64
avahi-compat-howl-devel-0.6.31-20.amzn2.x86_64
avahi-compat-libdns_sd-0.6.31-20.amzn2.x86_64
avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.x86_64
avahi-autoipd-0.6.31-20.amzn2.x86_64
avahi-dnsconfd-0.6.31-20.amzn2.x86_64
avahi-debuginfo-0.6.31-20.amzn2.x86_64
Red Hat: CVE-2017-6519
Mitre: CVE-2017-6519
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | avahi | < 0.6.31-20.amzn2 | avahi-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-tools | < 0.6.31-20.amzn2 | avahi-tools-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-ui-tools | < 0.6.31-20.amzn2 | avahi-ui-tools-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-glib | < 0.6.31-20.amzn2 | avahi-glib-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-glib-devel | < 0.6.31-20.amzn2 | avahi-glib-devel-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-gobject | < 0.6.31-20.amzn2 | avahi-gobject-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-gobject-devel | < 0.6.31-20.amzn2 | avahi-gobject-devel-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-ui | < 0.6.31-20.amzn2 | avahi-ui-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-ui-gtk3 | < 0.6.31-20.amzn2 | avahi-ui-gtk3-0.6.31-20.amzn2.aarch64.rpm |
Amazon Linux | 2 | aarch64 | avahi-ui-devel | < 0.6.31-20.amzn2 | avahi-ui-devel-0.6.31-20.amzn2.aarch64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
93.7%