Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2011-1002

CVE information

Published

13 years ago

Last Modified

3 months ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:avahi:avahi:0.6.25:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.24:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.23:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.27:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:avahi:avahi:0.6.26:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
  Yes
- -
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
  Yes
- -
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
  Yes
- -

References