Executive Summary

Informations
Name CVE-2011-1002 First vendor Publication 2011-02-22
Vendor Cve Last vendor Modification 2023-12-22

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12564
 
Oval ID: oval:org.mitre.oval:def:12564
Title: DSA-2174-1 avahi -- denial of service
Description: It was discovered that avahi, an implementation of the zeroconf protocol, can be crashed remotely by a single UDP packet, which may result in a denial of service.
Family: unix Class: patch
Reference(s): DSA-2174-1
CVE-2011-1002
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13195
 
Oval ID: oval:org.mitre.oval:def:13195
Title: USN-1084-1 -- avahi vulnerability
Description: It was discovered that Avahi incorrectly handled empty UDP packets. A remote attacker could send a specially-crafted packet and cause Avahi to hang, resulting in a denial of service.
Family: unix Class: patch
Reference(s): USN-1084-1
CVE-2011-1002
Version: 5
Platform(s): Ubuntu 8.04
Ubuntu 10.10
Ubuntu 9.10
Ubuntu 10.04
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21860
 
Oval ID: oval:org.mitre.oval:def:21860
Title: RHSA-2011:0779: avahi security and bug fix update (Moderate)
Description: avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Family: unix Class: patch
Reference(s): RHSA-2011:0779-01
CVE-2011-1002
Version: 4
Platform(s): Red Hat Enterprise Linux 6
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21960
 
Oval ID: oval:org.mitre.oval:def:21960
Title: RHSA-2011:0436: avahi security update (Moderate)
Description: avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Family: unix Class: patch
Reference(s): RHSA-2011:0436-01
CESA-2011:0436
CVE-2011-1002
Version: 4
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22953
 
Oval ID: oval:org.mitre.oval:def:22953
Title: ELSA-2011:0779: avahi security and bug fix update (Moderate)
Description: avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Family: unix Class: patch
Reference(s): ELSA-2011:0779-01
CVE-2011-1002
Version: 6
Platform(s): Oracle Linux 6
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23132
 
Oval ID: oval:org.mitre.oval:def:23132
Title: ELSA-2011:0436: avahi security update (Moderate)
Description: avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Family: unix Class: patch
Reference(s): ELSA-2011:0436-01
CVE-2011-1002
Version: 6
Platform(s): Oracle Linux 5
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27764
 
Oval ID: oval:org.mitre.oval:def:27764
Title: DEPRECATED: ELSA-2011-0779 -- avahi security and bug fix update (moderate)
Description: [0.6.25-11] - Fix for CVE-2011-1002 - Resolves: #684886 - Actually apply the patch [0.6.25-10] - Fix for CVE-2011-1002 - Resolves: #684886 [0.6.25-9] - Don't stomp on rpm's default CFLAGS when building
Family: unix Class: patch
Reference(s): ELSA-2011-0779
CVE-2011-1002
Version: 4
Platform(s): Oracle Linux 6
Product(s): avahi
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28123
 
Oval ID: oval:org.mitre.oval:def:28123
Title: DEPRECATED: ELSA-2011-0436 -- avahi security update (moderate)
Description: [0.6.16-10] - Fix for CVE-2011-1002 - Resolves: #684884
Family: unix Class: patch
Reference(s): ELSA-2011-0436
CVE-2011-1002
Version: 4
Platform(s): Oracle Linux 5
Product(s): avahi
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 35
Os 4
Os 3
Os 1
Os 2

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for avahi CESA-2011:0436 centos5 x86_64
File : nvt/gb_CESA-2011_0436_avahi_centos5_x86_64.nasl
2012-06-06 Name : RedHat Update for avahi RHSA-2011:0779-01
File : nvt/gb_RHSA-2011_0779-01_avahi.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-17 (avahi)
File : nvt/glsa_201110_17.nasl
2011-09-12 Name : Fedora Update for avahi FEDORA-2011-11588
File : nvt/gb_fedora_2011_11588_avahi_fc14.nasl
2011-08-09 Name : CentOS Update for avahi CESA-2011:0436 centos5 i386
File : nvt/gb_CESA-2011_0436_avahi_centos5_i386.nasl
2011-05-12 Name : avahi -- denial of service
File : nvt/freebsd_avahi.nasl
2011-04-19 Name : RedHat Update for avahi RHSA-2011:0436-01
File : nvt/gb_RHSA-2011_0436-01_avahi.nasl
2011-03-15 Name : Ubuntu Update for avahi vulnerability USN-1084-1
File : nvt/gb_ubuntu_USN_1084_1.nasl
2011-03-09 Name : Debian Security Advisory DSA 2174-1 (avahi)
File : nvt/deb_2174_1.nasl
2011-03-07 Name : Mandriva Update for pango MDVSA-2011:040 (pango)
File : nvt/gb_mandriva_MDVSA_2011_040.nasl
2011-02-28 Name : Mandriva Update for avahi MDVSA-2011:037 (avahi)
File : nvt/gb_mandriva_MDVSA_2011_037.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
70948 Avahi avahi-core/socket.c Empty UDP Packet Remote DoS

Avahi contains a flaw that may allow a remote denial of service. The issue is triggered when 'avahi-core/socket.c' in 'avahi-daemon' fails to properly handle empty IPv4 or IPv6 UDP packets sent to port 5353, allowing a remote attacker to cause an infinite loop which will trigger a denial of service.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_avahi-110228.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0436.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110412_avahi_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20110519_avahi_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-10-24 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201110-17.nasl - Type : ACT_GATHER_INFO
2011-09-12 Name : The remote Fedora host is missing a security update.
File : fedora_2011-11588.nasl - Type : ACT_GATHER_INFO
2011-05-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0779.nasl - Type : ACT_GATHER_INFO
2011-05-05 Name : The remote openSUSE host is missing a security update.
File : suse_11_2_avahi-110228.nasl - Type : ACT_GATHER_INFO
2011-04-15 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-0436.nasl - Type : ACT_GATHER_INFO
2011-04-13 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0436.nasl - Type : ACT_GATHER_INFO
2011-03-15 Name : The remote Fedora host is missing a security update.
File : fedora_2011-3033.nasl - Type : ACT_GATHER_INFO
2011-03-15 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_8b986a054dbe11e08b9a02e0184b8d35.nasl - Type : ACT_GATHER_INFO
2011-03-08 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1084-1.nasl - Type : ACT_GATHER_INFO
2011-03-04 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-040.nasl - Type : ACT_GATHER_INFO
2011-03-01 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2174.nasl - Type : ACT_GATHER_INFO
2011-02-25 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-037.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/46446
CONFIRM http://avahi.org/ticket/325
https://bugzilla.redhat.com/show_bug.cgi?id=667187
DEBIAN http://www.debian.org/security/2011/dsa-2174
FEDORA http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055858.html
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2011:037
http://www.mandriva.com/security/advisories?name=MDVSA-2011:040
MISC http://git.0pointer.de/?p=avahi.git%3Ba=commit%3Bh=46109dfec75534fe270c0ab902...
http://xorl.wordpress.com/2011/02/20/cve-2011-1002-avahi-daemon-remote-denial...
MLIST http://openwall.com/lists/oss-security/2011/02/18/1
http://openwall.com/lists/oss-security/2011/02/18/4
http://www.openwall.com/lists/oss-security/2011/02/22/9
OSVDB http://osvdb.org/70948
REDHAT http://www.redhat.com/support/errata/RHSA-2011-0436.html
http://www.redhat.com/support/errata/RHSA-2011-0779.html
SECUNIA http://secunia.com/advisories/43361
http://secunia.com/advisories/43465
http://secunia.com/advisories/43605
http://secunia.com/advisories/43673
http://secunia.com/advisories/44131
SUSE http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
UBUNTU http://ubuntu.com/usn/usn-1084-1
VUPEN http://www.vupen.com/english/advisories/2011/0448
http://www.vupen.com/english/advisories/2011/0499
http://www.vupen.com/english/advisories/2011/0511
http://www.vupen.com/english/advisories/2011/0565
http://www.vupen.com/english/advisories/2011/0601
http://www.vupen.com/english/advisories/2011/0670
http://www.vupen.com/english/advisories/2011/0969
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/65524
https://exchange.xforce.ibmcloud.com/vulnerabilities/65525

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2023-12-22 21:31:47
  • Multiple Updates
2023-11-09 21:41:55
  • Multiple Updates
2023-11-07 21:47:29
  • Multiple Updates
2023-02-13 09:29:00
  • Multiple Updates
2023-02-02 21:28:48
  • Multiple Updates
2021-05-04 12:14:07
  • Multiple Updates
2021-04-22 01:15:19
  • Multiple Updates
2020-05-23 01:43:59
  • Multiple Updates
2020-05-23 00:27:55
  • Multiple Updates
2017-08-17 09:23:19
  • Multiple Updates
2016-06-28 18:34:29
  • Multiple Updates
2016-04-26 20:35:48
  • Multiple Updates
2014-06-14 13:30:26
  • Multiple Updates
2014-02-17 11:00:51
  • Multiple Updates
2014-02-12 13:22:13
  • Multiple Updates
2013-05-10 22:55:56
  • Multiple Updates