Vulnerability Description
The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Avahi | Avahi-Daemon | 0.6.23 |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html
- http://secunia.com/advisories/38420
- http://www.debian.org/security/2010/dsa-2086
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:076
- http://www.openwall.com/lists/oss-security/2009/03/02/1
- http://www.securityfocus.com/bid/33946
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html
- http://secunia.com/advisories/38420
- http://www.debian.org/security/2010/dsa-2086
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:076
- http://www.openwall.com/lists/oss-security/2009/03/02/1
- http://www.securityfocus.com/bid/33946
FAQ
What is CVE-2009-0758?
CVE-2009-0758 is a vulnerability with a CVSS score of 7.8 (HIGH). The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast p...
How severe is CVE-2009-0758?
CVE-2009-0758 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0758?
Check the references section above for vendor advisories and patch information. Affected products include: Avahi Avahi-Daemon.