Executive Summary

Title Avahi vulnerabilities
NameUSN-3876-2First vendor Publication2019-01-31
VendorUbuntuLast vendor Modification2019-01-31
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P)
Cvss Base Score6.4Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM


Several security issues were fixed in Avahi.

Software Description: - avahi: Avahi IPv4LL network address configuration daemon


USN-3876-1 fixed a vulnerability in Avahi. This update provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

テつ Chad Seaman discovered that Avahi incorrectly handled certain messages. テつ An attacker could possibly use this issue to cause a denial of service. テつ (CVE-2017-6519, CVE-2018-1000845)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM: テつ avahi-daemonテつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 0.6.30-5ubuntu2.3 テつ libavahi-core7テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ テつ 0.6.30-5ubuntu2.3

In general, a standard system update will make all the necessary changes.

References: テつ https://usn.ubuntu.com/usn/usn-3876-2 テつ https://usn.ubuntu.com/usn/usn-3876-1 テつ CVE-2017-6519, CVE-2018-1000845

Original Source

Url : http://www.ubuntu.com/usn/USN-3876-2

CWE : Common Weakness Enumeration

100 %CWE-284Access Control (Authorization) Issues

CPE : Common Platform Enumeration


Alert History

If you want to see full details history, please login or register.
2019-01-31 17:18:49
  • First insertion