exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26791

Secunia Security Advisory 26791
Posted Sep 19, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for avahi. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, mandriva
SHA-256 | e0eb90610e2498f5442fee2753ea5948a1f8503d924d7ece64ae65b9b4bf2347

Secunia Security Advisory 26791

Change Mirror Download


----------------------------------------------------------------------

BETA test the new Secunia Personal Software Inspector!

The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.

Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/

----------------------------------------------------------------------

TITLE:
Mandriva update for avahi

SECUNIA ADVISORY ID:
SA26791

VERIFY ADVISORY:
http://secunia.com/advisories/26791/

CRITICAL:
Not critical

IMPACT:
DoS

WHERE:
Local system

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for avahi. This fixes a security issue,
which can be exploited by malicious, local users to cause a DoS
(Denial of Service).

For more information:
SA25811

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007 --

9b42ab7d33f6f3645ffb1d8c10f2b7be
2007.0/i586/avahi-0.6.13-4.3mdv2007.0.i586.rpm
3dd8f44477109b6be1937d027c04334f
2007.0/i586/avahi-dnsconfd-0.6.13-4.3mdv2007.0.i586.rpm
61d1ad9658ee265ace14d11ec319feb3
2007.0/i586/avahi-python-0.6.13-4.3mdv2007.0.i586.rpm
4b2442311c56146a8769d271705835a3
2007.0/i586/avahi-sharp-0.6.13-4.3mdv2007.0.i586.rpm
6c65b69658bf5fba762baceb8d54c618
2007.0/i586/avahi-x11-0.6.13-4.3mdv2007.0.i586.rpm
8974d63f0c51d711c64476f23de79091
2007.0/i586/libavahi-client3-0.6.13-4.3mdv2007.0.i586.rpm
653beb7c63bd95a2ff04420ce45cfb3c
2007.0/i586/libavahi-client3-devel-0.6.13-4.3mdv2007.0.i586.rpm
d57e3395370d334c3d0389b5d27f69ee
2007.0/i586/libavahi-common3-0.6.13-4.3mdv2007.0.i586.rpm
9033a6df7041a041c994cb69615ba62f
2007.0/i586/libavahi-common3-devel-0.6.13-4.3mdv2007.0.i586.rpm
bd4189a93e747941a4b65fb93f7cde38
2007.0/i586/libavahi-compat-howl0-0.6.13-4.3mdv2007.0.i586.rpm
884f7d0baf1af89fe6e3975975555d41
2007.0/i586/libavahi-compat-howl0-devel-0.6.13-4.3mdv2007.0.i586.rpm
1f50ca143a4fbbf6cada79fc4f736c29
2007.0/i586/libavahi-compat-libdns_sd1-0.6.13-4.3mdv2007.0.i586.rpm
b4fbae18da3a0823c073a71b917a36fe
2007.0/i586/libavahi-compat-libdns_sd1-devel-0.6.13-4.3mdv2007.0.i586.rpm
7331d7cde7c5184a0da289639182df6f
2007.0/i586/libavahi-core4-0.6.13-4.3mdv2007.0.i586.rpm
3a5e26980894b846ebf960d5f50d21cc
2007.0/i586/libavahi-core4-devel-0.6.13-4.3mdv2007.0.i586.rpm
b9c5809919acd3fd33c148dfa3c91959
2007.0/i586/libavahi-glib1-0.6.13-4.3mdv2007.0.i586.rpm
d42c43448e010d0b75f561d276402dff
2007.0/i586/libavahi-glib1-devel-0.6.13-4.3mdv2007.0.i586.rpm
c7f30225b0153e555466b6ee37a857d3
2007.0/i586/libavahi-qt3_1-0.6.13-4.3mdv2007.0.i586.rpm
abe726ef80d631e068eef0b73eb1cd76
2007.0/i586/libavahi-qt3_1-devel-0.6.13-4.3mdv2007.0.i586.rpm
263c40aeddc7aa56284dcccd94061b83
2007.0/i586/libavahi-qt4_1-0.6.13-4.3mdv2007.0.i586.rpm
6165066dd59ecd5e965b8cc9a6794b3e
2007.0/i586/libavahi-qt4_1-devel-0.6.13-4.3mdv2007.0.i586.rpm
a078edca8e651bd288b99eb071c477a4
2007.0/SRPMS/avahi-0.6.13-4.3mdv2007.0.src.rpm

-- Mandriva Linux 2007/X86_64 --

32bdcbf34c11d3b568660f1269f7739f
2007.0/x86_64/avahi-0.6.13-4.3mdv2007.0.x86_64.rpm
119731a972772a866be55a8a3794d6e8
2007.0/x86_64/avahi-dnsconfd-0.6.13-4.3mdv2007.0.x86_64.rpm
54bb90936d710ffe021eaa327bf906cc
2007.0/x86_64/avahi-python-0.6.13-4.3mdv2007.0.x86_64.rpm
c627d10f177aec68260e96c2fbebf302
2007.0/x86_64/avahi-sharp-0.6.13-4.3mdv2007.0.x86_64.rpm
e03e889615e72e05fa159ca33ce8652f
2007.0/x86_64/avahi-x11-0.6.13-4.3mdv2007.0.x86_64.rpm
0818f91e8d83fc4bffd753218b14b7d8
2007.0/x86_64/lib64avahi-client3-0.6.13-4.3mdv2007.0.x86_64.rpm
f63e399dee05af7c36fd477a2b1965c5
2007.0/x86_64/lib64avahi-client3-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
96e1032970e9a5df235c9457d69f6363
2007.0/x86_64/lib64avahi-common3-0.6.13-4.3mdv2007.0.x86_64.rpm
027aecd334aadac0c7789b6e70ef96c6
2007.0/x86_64/lib64avahi-common3-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
c09888641a61a677cbfad98fe185ce5a
2007.0/x86_64/lib64avahi-compat-howl0-0.6.13-4.3mdv2007.0.x86_64.rpm
b202d3105c17842df5280e220e09eceb
2007.0/x86_64/lib64avahi-compat-howl0-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
06b9daaa3516cfd3a11c852a9704a3b2
2007.0/x86_64/lib64avahi-compat-libdns_sd1-0.6.13-4.3mdv2007.0.x86_64.rpm
0f21e479c3adf79e5f2b85317e0543f1
2007.0/x86_64/lib64avahi-compat-libdns_sd1-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
aa9db148a186ca2fcd1d248b555962b2
2007.0/x86_64/lib64avahi-core4-0.6.13-4.3mdv2007.0.x86_64.rpm
3e0b6921ea49c48f7ce07a661cab7547
2007.0/x86_64/lib64avahi-core4-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
482416289f4fa44c9802b496b9d32b43
2007.0/x86_64/lib64avahi-glib1-0.6.13-4.3mdv2007.0.x86_64.rpm
ee224788f649a439cc7da2b8de29944e
2007.0/x86_64/lib64avahi-glib1-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
3c2ccc7e6c378ee9c79847b17038c40
2007.0/x86_64/lib64avahi-qt3_1-0.6.13-4.3mdv2007.0.x86_64.rpm
21d19035cd5e813004f3cc5cff646087
2007.0/x86_64/lib64avahi-qt3_1-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
2519453410006dc4dcd63b3156260dad
2007.0/x86_64/lib64avahi-qt4_1-0.6.13-4.3mdv2007.0.x86_64.rpm
476cf9a62a1fa5aeb5337c87218fca4c
2007.0/x86_64/lib64avahi-qt4_1-devel-0.6.13-4.3mdv2007.0.x86_64.rpm
a078edca8e651bd288b99eb071c477a4
2007.0/SRPMS/avahi-0.6.13-4.3mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:185

OTHER REFERENCES:
SA25811:
http://secunia.com/advisories/25811/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close