Fedora 14 : avahi-0.6.27-8.fc14 (2011-11588)

medium Nessus Plugin ID 56151

Synopsis

The remote Fedora host is missing a security update.

Description

Fixes CVE-2011-1002.

The MITRE CVE dictionary describes this issue as :

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.

Find out more about CVE-2011-1002 from the MITRE CVE dictionary and NIST NVD.

This also disables gtk3 support. Unfortunately gtk3 support in F14 is broken and Avahi cannot be compiled against it. Since gtk3 will not be fixed in F14 anymore and nobody uses it we instead disable it in Avahi.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected avahi package.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=667187

http://www.nessus.org/u?0a8e18cd

Plugin Details

Severity: Medium

ID: 56151

File Name: fedora_2011-11588.nasl

Version: 1.12

Type: local

Agent: unix

Published: 9/12/2011

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:fedoraproject:fedora:14, p-cpe:/a:fedoraproject:fedora:avahi

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/26/2011

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-2244, CVE-2011-1002

BID: 46446

FEDORA: 2011-11588