4.3
CVSSv2

CVE-2010-2244

Published: 08/07/2010 Updated: 07/03/2011
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.

Vulnerable Product Search on Vulmon Subscribe to Product

avahi avahi 0.6.25

avahi avahi 0.6.16

Vendor Advisories

It was discovered that Avahi incorrectly handled certain mDNS query packets when the reflector feature is enabled, which is not the default configuration on Ubuntu A remote attacker could send crafted mDNS queries and perform a denial of service on the server and on the network This issue only affected Ubuntu 804 LTS and 904 (CVE-2009-0758) ...
Debian Bug report logs - #614785 avahi-daemon uses 100% of cpu when scanned with nmap (DoS possible?) Package: avahi-daemon; Maintainer for avahi-daemon is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Source for avahi-daemon is src:avahi (PTS, buildd, popcon) Reported by: Alexander Kurtz <kurt ...