Mandrake Linux Security Advisory : avahi (MDKSA-2007:003)

medium Nessus Plugin ID 24620

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.

Updated packages are patched to address this issue.

Solution

Update the affected packages.

Plugin Details

Severity: Medium

ID: 24620

File Name: mandrake_MDKSA-2007-003.nasl

Version: 1.17

Type: local

Published: 2/18/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:avahi, p-cpe:/a:mandriva:linux:avahi-dnsconfd, p-cpe:/a:mandriva:linux:avahi-python, p-cpe:/a:mandriva:linux:avahi-sharp, p-cpe:/a:mandriva:linux:avahi-x11, p-cpe:/a:mandriva:linux:lib64avahi-client3, p-cpe:/a:mandriva:linux:lib64avahi-client3-devel, p-cpe:/a:mandriva:linux:lib64avahi-common3, p-cpe:/a:mandriva:linux:lib64avahi-common3-devel, p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0, p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0-devel, p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1, p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1-devel, p-cpe:/a:mandriva:linux:lib64avahi-core4, p-cpe:/a:mandriva:linux:lib64avahi-core4-devel, p-cpe:/a:mandriva:linux:lib64avahi-glib1, p-cpe:/a:mandriva:linux:lib64avahi-glib1-devel, p-cpe:/a:mandriva:linux:lib64avahi-qt3_1, p-cpe:/a:mandriva:linux:lib64avahi-qt3_1-devel, p-cpe:/a:mandriva:linux:lib64avahi-qt4_1, p-cpe:/a:mandriva:linux:lib64avahi-qt4_1-devel, p-cpe:/a:mandriva:linux:libavahi-client3, p-cpe:/a:mandriva:linux:libavahi-client3-devel, p-cpe:/a:mandriva:linux:libavahi-common3, p-cpe:/a:mandriva:linux:libavahi-common3-devel, p-cpe:/a:mandriva:linux:libavahi-compat-howl0, p-cpe:/a:mandriva:linux:libavahi-compat-howl0-devel, p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1, p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1-devel, p-cpe:/a:mandriva:linux:libavahi-core4, p-cpe:/a:mandriva:linux:libavahi-core4-devel, p-cpe:/a:mandriva:linux:libavahi-glib1, p-cpe:/a:mandriva:linux:libavahi-glib1-devel, p-cpe:/a:mandriva:linux:libavahi-qt3_1, p-cpe:/a:mandriva:linux:libavahi-qt3_1-devel, p-cpe:/a:mandriva:linux:libavahi-qt4_1, p-cpe:/a:mandriva:linux:libavahi-qt4_1-devel, cpe:/o:mandriva:linux:2007

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/8/2007

Reference Information

CVE: CVE-2006-6870

BID: 21881

MDKSA: 2007:003