2.1
CVSSv2

CVE-2007-3372

Published: 22/06/2007 Updated: 16/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The Avahi daemon in Avahi prior to 0.6.20 allows malicious users to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

avahi avahi

Vendor Advisories

Emanuele Aina discovered that Avahi did not properly validate its input when processing data over D-Bus A local attacker could send an empty TXT message via D-Bus and cause a denial of service (failed assertion) This issue only affected Ubuntu 606 LTS (CVE-2007-3372) ...
Debian Bug report logs - #508700 [CVE-2008-5081] avahi daemon DoS through zero source port Package: avahi-daemon; Maintainer for avahi-daemon is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Source for avahi-daemon is src:avahi (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode ...
Two denial of service conditions were discovered in avahi, a Multicast DNS implementation Huge Dias discovered that the avahi daemon aborts with an assert error if it encounters a UDP packet with source port 0 (CVE-2008-5081) It was discovered that the avahi daemon aborts with an assert error if it receives an empty TXT record over D-Bus (CVE-200 ...