CVE-2017-6519

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-6519
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-6519.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-6519
Downstream
Related
Published
2017-05-01T01:59:00Z
Modified
2025-10-15T09:03:52.460309Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H CVSS Calculator
Summary
[none]
Details

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

References

Affected packages

Git / github.com/lathiat/avahi

Affected ranges

Type
GIT
Repo
https://github.com/lathiat/avahi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

0.*

0.6.32-rc

v0.*

v0.6.23
v0.6.24
v0.6.25
v0.6.26
v0.6.27
v0.6.28
v0.6.29
v0.6.30
v0.6.31
v0.6.32