7.8
CVSSv3

CVE-2021-26720

Published: 17/02/2021 Updated: 06/12/2022
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

avahi-daemon-check-dns.sh in the Debian avahi package up to and including 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local malicious user to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

avahi avahi

debian debian linux 9.0

debian debian linux 10.0

Mailing Lists

Hello list, the avahi-daemon package [1] in Debian Linux contains a Debian specific script installed in /usr/lib/avahi/avahi-daemon-check-dnssh This script is run as 'root' via the if-upd script in /etc/network/if-upd/avahi-daemon There are security issues in the code of the main shell script in this context The $RUNDIR "/run/avahi ...