CVE-2017-6519 — Insufficient Control of Network Message Volume (Network Amplification) in Avahi
Severity
9.1CRITICALNVD
OSV5.0
EPSS
1.1%
top 21.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateMay 13
Description
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2
Affected Packages7 packages
Also affects: Ubuntu Linux 12.04, 14.04, 16.04, 18.04, 18.10
Patches
🔴Vulnerability Details
3📋Vendor Advisories
6Microsoft▶
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link which allows remote attackers to cause a denial of service (traff↗2017-05-09
Debian▶
CVE-2017-6519: avahi - avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unic...↗2017