6.4
CVSSv2

CVE-2017-6519

Published: 01/05/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

avahi-daemon in Avahi up to and including 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote malicious users to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

avahi avahi

avahi avahi 0.7

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

Vendor Advisories

Synopsis Low: avahi security update Type/Severity Security Advisory: Low Topic An update for avahi is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives a detaile ...
Debian Bug report logs - #917047 avahi: CVE-2017-6519: DNS amplification and reflection to spoofed addresses Package: src:avahi; Maintainer for src:avahi is Utopia Maintenance Team <pkg-utopia-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 21 Dec 2018 23:09:02 UT ...
Several security issues were fixed in Avahi ...
Several security issues were fixed in Avahi ...
avahi-daemon in Avahi through 0632 and 07 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP pack ...
avahi-daemon in Avahi through 0632 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) or obtain potentially sensitive information via port-5353 UDP packets NOTE: this may overlap CVE-2015-2809 ...