Lucene search

K
amazonAmazonALAS2-2020-1502
HistoryOct 22, 2020 - 5:19 p.m.

Low: avahi

2020-10-2217:19:00
alas.aws.amazon.com
9
avahi-daemon
avahi
ipv6
unicast
denial of service
information leakage
amazon linux 2

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.2

Confidence

High

EPSS

0.062

Percentile

93.7%

Issue Overview:

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809. (CVE-2017-6519)

Affected Packages:

avahi

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update avahi to update your system.

New Packages:

aarch64:  
    avahi-0.6.31-20.amzn2.aarch64  
    avahi-tools-0.6.31-20.amzn2.aarch64  
    avahi-ui-tools-0.6.31-20.amzn2.aarch64  
    avahi-glib-0.6.31-20.amzn2.aarch64  
    avahi-glib-devel-0.6.31-20.amzn2.aarch64  
    avahi-gobject-0.6.31-20.amzn2.aarch64  
    avahi-gobject-devel-0.6.31-20.amzn2.aarch64  
    avahi-ui-0.6.31-20.amzn2.aarch64  
    avahi-ui-gtk3-0.6.31-20.amzn2.aarch64  
    avahi-ui-devel-0.6.31-20.amzn2.aarch64  
    avahi-qt3-0.6.31-20.amzn2.aarch64  
    avahi-qt3-devel-0.6.31-20.amzn2.aarch64  
    avahi-qt4-0.6.31-20.amzn2.aarch64  
    avahi-qt4-devel-0.6.31-20.amzn2.aarch64  
    avahi-libs-0.6.31-20.amzn2.aarch64  
    avahi-devel-0.6.31-20.amzn2.aarch64  
    avahi-compat-howl-0.6.31-20.amzn2.aarch64  
    avahi-compat-howl-devel-0.6.31-20.amzn2.aarch64  
    avahi-compat-libdns_sd-0.6.31-20.amzn2.aarch64  
    avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.aarch64  
    avahi-autoipd-0.6.31-20.amzn2.aarch64  
    avahi-dnsconfd-0.6.31-20.amzn2.aarch64  
    avahi-debuginfo-0.6.31-20.amzn2.aarch64  
  
i686:  
    avahi-0.6.31-20.amzn2.i686  
    avahi-tools-0.6.31-20.amzn2.i686  
    avahi-ui-tools-0.6.31-20.amzn2.i686  
    avahi-glib-0.6.31-20.amzn2.i686  
    avahi-glib-devel-0.6.31-20.amzn2.i686  
    avahi-gobject-0.6.31-20.amzn2.i686  
    avahi-gobject-devel-0.6.31-20.amzn2.i686  
    avahi-ui-0.6.31-20.amzn2.i686  
    avahi-ui-gtk3-0.6.31-20.amzn2.i686  
    avahi-ui-devel-0.6.31-20.amzn2.i686  
    avahi-qt3-0.6.31-20.amzn2.i686  
    avahi-qt3-devel-0.6.31-20.amzn2.i686  
    avahi-qt4-0.6.31-20.amzn2.i686  
    avahi-qt4-devel-0.6.31-20.amzn2.i686  
    avahi-libs-0.6.31-20.amzn2.i686  
    avahi-devel-0.6.31-20.amzn2.i686  
    avahi-compat-howl-0.6.31-20.amzn2.i686  
    avahi-compat-howl-devel-0.6.31-20.amzn2.i686  
    avahi-compat-libdns_sd-0.6.31-20.amzn2.i686  
    avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.i686  
    avahi-autoipd-0.6.31-20.amzn2.i686  
    avahi-dnsconfd-0.6.31-20.amzn2.i686  
    avahi-debuginfo-0.6.31-20.amzn2.i686  
  
src:  
    avahi-0.6.31-20.amzn2.src  
  
x86_64:  
    avahi-0.6.31-20.amzn2.x86_64  
    avahi-tools-0.6.31-20.amzn2.x86_64  
    avahi-ui-tools-0.6.31-20.amzn2.x86_64  
    avahi-glib-0.6.31-20.amzn2.x86_64  
    avahi-glib-devel-0.6.31-20.amzn2.x86_64  
    avahi-gobject-0.6.31-20.amzn2.x86_64  
    avahi-gobject-devel-0.6.31-20.amzn2.x86_64  
    avahi-ui-0.6.31-20.amzn2.x86_64  
    avahi-ui-gtk3-0.6.31-20.amzn2.x86_64  
    avahi-ui-devel-0.6.31-20.amzn2.x86_64  
    avahi-qt3-0.6.31-20.amzn2.x86_64  
    avahi-qt3-devel-0.6.31-20.amzn2.x86_64  
    avahi-qt4-0.6.31-20.amzn2.x86_64  
    avahi-qt4-devel-0.6.31-20.amzn2.x86_64  
    avahi-libs-0.6.31-20.amzn2.x86_64  
    avahi-devel-0.6.31-20.amzn2.x86_64  
    avahi-compat-howl-0.6.31-20.amzn2.x86_64  
    avahi-compat-howl-devel-0.6.31-20.amzn2.x86_64  
    avahi-compat-libdns_sd-0.6.31-20.amzn2.x86_64  
    avahi-compat-libdns_sd-devel-0.6.31-20.amzn2.x86_64  
    avahi-autoipd-0.6.31-20.amzn2.x86_64  
    avahi-dnsconfd-0.6.31-20.amzn2.x86_64  
    avahi-debuginfo-0.6.31-20.amzn2.x86_64  

Additional References

Red Hat: CVE-2017-6519

Mitre: CVE-2017-6519

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.2

Confidence

High

EPSS

0.062

Percentile

93.7%