vulnerability
Amazon Linux AMI 2: CVE-2024-52616: Security patch for avahi (ALAS-2024-2704)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Nov 21, 2024 | Dec 20, 2024 | Jan 28, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Nov 21, 2024
Added
Dec 20, 2024
Modified
Jan 28, 2025
Description
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Solutions
amazon-linux-ami-2-upgrade-avahiamazon-linux-ami-2-upgrade-avahi-autoipdamazon-linux-ami-2-upgrade-avahi-compat-howlamazon-linux-ami-2-upgrade-avahi-compat-howl-develamazon-linux-ami-2-upgrade-avahi-compat-libdns_sdamazon-linux-ami-2-upgrade-avahi-compat-libdns_sd-develamazon-linux-ami-2-upgrade-avahi-debuginfoamazon-linux-ami-2-upgrade-avahi-develamazon-linux-ami-2-upgrade-avahi-dnsconfdamazon-linux-ami-2-upgrade-avahi-glibamazon-linux-ami-2-upgrade-avahi-glib-develamazon-linux-ami-2-upgrade-avahi-gobjectamazon-linux-ami-2-upgrade-avahi-gobject-develamazon-linux-ami-2-upgrade-avahi-libsamazon-linux-ami-2-upgrade-avahi-qt3amazon-linux-ami-2-upgrade-avahi-qt3-develamazon-linux-ami-2-upgrade-avahi-qt4amazon-linux-ami-2-upgrade-avahi-qt4-develamazon-linux-ami-2-upgrade-avahi-toolsamazon-linux-ami-2-upgrade-avahi-uiamazon-linux-ami-2-upgrade-avahi-ui-develamazon-linux-ami-2-upgrade-avahi-ui-gtk3amazon-linux-ami-2-upgrade-avahi-ui-tools
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.