Lucene search

K
debianDebianDEBIAN:DSA-2174-1:0E7B0
HistoryFeb 26, 2011 - 3:50 p.m.

[SECURITY] [DSA 2174-1] avahi security update

2011-02-2615:50:04
lists.debian.org
20

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

9.2

Confidence

High

EPSS

0.075

Percentile

94.1%


Debian Security Advisory DSA-2174-1 [email protected]
http://www.debian.org/security/ Thijs Kinkhorst
February 26, 2011 http://www.debian.org/security/faq


Package : avahi
Vulnerability : denial of service
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-1002
Debian Bug : 614785

It was discovered that avahi, an implementation of the zeroconf protocol,
can be crashed remotely by a single UDP packet, which may result in a
denial of service.

For the oldstable distribution (lenny), this problem has been fixed in
version 0.6.23-3lenny3.

For the stable distribution (squeeze), this problem has been fixed in
version 0.6.27-2+squeeze1.

For the testing (wheezy) and unstable distribution (sid), this problem
has been fixed in version 0.6.28-4.

We recommend that you upgrade your avahi packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

AI Score

9.2

Confidence

High

EPSS

0.075

Percentile

94.1%