Untriaged
Permalink
CVE-2024-52616
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): NONE
Avahi: avahi wide-area dns predictable transaction ids
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
References
Affected products
avahi
- *
- <0.9
rhcos
Matching in nixpkgs
pkgs.avahi
mDNS/DNS-SD implementation
pkgs.guile-avahi
Bindings to Avahi for GNU Guile
pkgs.avahi-compat
mDNS/DNS-SD implementation
pkgs.haskellPackages.avahi
Minimal DBus bindings for Avahi daemon (http://avahi.org)
pkgs.python312Packages.avahi
mDNS/DNS-SD implementation
Package maintainers
-
@globin Robin Gloster <mail@glob.in>
-
@lovek323 Jason O'Conal <jason@oconal.id.au>
-
@foo-dogsquared Gabriel Arazas <foodogsquared@foodogsquared.one>