The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
Link | Tags |
---|---|
http://secunia.com/advisories/26083 | third party advisory |
http://secunia.com/advisories/33220 | third party advisory |
http://www.securityfocus.com/archive/1/472443/100/0/threaded | mailing list |
http://www.securitytracker.com/id?1018706 | vdb entry |
http://secunia.com/advisories/33279 | third party advisory |
http://www.novell.com/linux/security/advisories/2007_14_sr.html | vendor advisory |
http://www.securityfocus.com/bid/24614 | vdb entry |
http://www.vupen.com/english/advisories/2007/2317 | vdb entry |
http://osvdb.org/37507 | vdb entry |
http://secunia.com/advisories/25811 | third party advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:185 | vendor advisory |
http://avahi.org/changeset/1482 | |
http://www.ubuntu.com/usn/usn-696-1 | vendor advisory |
http://www.debian.org/security/2008/dsa-1690 | vendor advisory |
http://secunia.com/advisories/26791 | third party advisory |
http://avahi.org/milestone/Avahi%200.6.20 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35036 | vdb entry |