CVE-2025-59529Uncontrolled Resource Consumption in Avahi

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 88.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 18

Description

Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In versions up to and including 0.9-rc2, the simple protocol server ignores the documented client limit and accepts unlimited connections, allowing for easy local DoS. Although `CLIENTS_MAX` is defined, `server_work()` unconditionally `accept()`s and `client_new()` always appends the new client and increments `n_clients`. There is no check against the limit. When client cannot be accepted

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

Patches

🔴Vulnerability Details

1
OSV
CVE-2025-59529: Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite2025-12-18

📋Vendor Advisories

3
Red Hat
avahi: simple clients denial-of-service2025-12-11
Microsoft
simple protocol server ignores accepts unlimited connections and logs failures without limit2025-12-09
Debian
CVE-2025-59529: avahi - Avahi is a system which facilitates service discovery on a local network via the...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-59529 Impact, Exploitability, and Mitigation Steps | Wiz