what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2008-5081

Status Candidate

Overview

The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.

Related Files

Avahi Source Port 0 Denial of Service
Posted Aug 31, 2024
Authored by Kris Katterjohn | Site metasploit.com

Avahi-daemon versions prior to 0.6.24 can be DoSd with an mDNS packet with a source port of 0.

tags | exploit
advisories | CVE-2008-5081
SHA-256 | 9148d8104748fb23327bdda0c398d13bd00d8494f309e5c0dd2426eaee5c8102
Mandriva Linux Security Advisory 2009-031
Posted Feb 1, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-031 - A vulnerability has been discovered in Avahi before 0.6.24, which allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0. The updated packages have been patched to prevent this.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-5081
SHA-256 | f15a9e069ec8d7ce72a65f22fcacbb8543a8741f2ae5a0e24cb72da05e2bcca5
Gentoo Linux Security Advisory 200901-11
Posted Jan 15, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200901-11 - A Denial of Service vulnerability has been discovered in Avahi. Hugo Dias reported a failed assertion in the originates_from_local_legacy_unicast_socket() function in avahi-core/server.c when processing mDNS packets with a source port of 0. Versions less than 0.6.24 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2008-5081
SHA-256 | 728f3a014d0f773b7ef89d5f2678653b123b208673730d5a49f1b6610dea17be
Debian Linux Security Advisory 1690-1
Posted Dec 30, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1690-1 - Two denial of service conditions were discovered in avahi, a Multicast DNS implementation.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2007-3372, CVE-2008-5081
SHA-256 | ef1a5df07104978bb17173fe99f506005c7a6bbe6cf093b6fdec41e6a73983b8
Ubuntu Security Notice 696-1
Posted Dec 30, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-696-1 - Emanuele Aina discovered that Avahi did not properly validate it's input when processing data over D-Bus. A local attacker could send an empty TXT message via D-Bus and cause a denial of service (failed assertion). This issue only affected Ubuntu 6.06 LTS. Hugo Dias discovered that Avahi did not properly verify it's input when processing mDNS packets. A remote attacker could send a crafted mDNS packet and cause a denial of service (assertion failure).

tags | advisory, remote, denial of service, local
systems | linux, ubuntu
advisories | CVE-2007-3372, CVE-2008-5081
SHA-256 | 4ed8338613bd90bd9db4370e94dd72fdf7c7aeb5538276764c37e414ec7895f3
Avahi Remote Denial Of Service Exploit
Posted Dec 22, 2008
Authored by Jon Oberheide

Avahi mDNS daemon versions below 0.6.24 remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2008-5081
SHA-256 | 21710acf10701ccd19d56410ec9950524c32406536eccbcb87f1aab4060bb059
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close