Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.
Link | Tags |
---|---|
http://secunia.com/advisories/22932 | third party advisory |
http://secunia.com/advisories/23042 | third party advisory |
http://www.novell.com/linux/security/advisories/2006_26_sr.html | vendor advisory |
http://secunia.com/advisories/22852 | third party advisory patch vendor advisory |
https://usn.ubuntu.com/380-1/ | vendor advisory |
http://www.vupen.com/english/advisories/2006/4474 | vdb entry |
http://secunia.com/advisories/23020 | third party advisory |
http://secunia.com/advisories/22807 | third party advisory patch vendor advisory |
http://avahi.org/milestone/Avahi%200.6.15 | |
http://securitytracker.com/id?1017257 | vdb entry |
https://tango.0pointer.de/pipermail/avahi-tickets/2006-November/000320.html | mailing list |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:215 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30207 | vdb entry |
http://www.gentoo.org/security/en/glsa/glsa-200611-13.xml | vendor advisory |
http://www.securityfocus.com/bid/21016 | vdb entry |