CVE-2024-52616Small Space of Random Values in Avahi

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 75.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21

Description

A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

🔴Vulnerability Details

1
OSV
CVE-2024-52616: A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after tha2024-11-21

📋Vendor Advisories

3
Red Hat
avahi: Avahi Wide-Area DNS Predictable Transaction IDs2024-11-15
Microsoft
Avahi: avahi wide-area dns predictable transaction ids2024-11-12
Debian
CVE-2024-52616: avahi - A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs r...2024