vulnerability
Red Hat: CVE-2021-3502: reachable assertion in avahi_s_host_name_resolver_start when trying to resolve badly-formatted hostnames (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | May 7, 2021 | Nov 8, 2023 | Sep 3, 2024 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
May 7, 2021
Added
Nov 8, 2023
Modified
Sep 3, 2024
Description
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
Solution(s)
redhat-upgrade-avahiredhat-upgrade-avahi-autoipd-debuginforedhat-upgrade-avahi-compat-howlredhat-upgrade-avahi-compat-howl-debuginforedhat-upgrade-avahi-compat-howl-develredhat-upgrade-avahi-compat-libdns_sdredhat-upgrade-avahi-compat-libdns_sd-debuginforedhat-upgrade-avahi-compat-libdns_sd-develredhat-upgrade-avahi-debuginforedhat-upgrade-avahi-debugsourceredhat-upgrade-avahi-develredhat-upgrade-avahi-dnsconfd-debuginforedhat-upgrade-avahi-glibredhat-upgrade-avahi-glib-debuginforedhat-upgrade-avahi-glib-develredhat-upgrade-avahi-gobject-debuginforedhat-upgrade-avahi-libsredhat-upgrade-avahi-libs-debuginforedhat-upgrade-avahi-toolsredhat-upgrade-avahi-tools-debuginforedhat-upgrade-avahi-ui-debuginforedhat-upgrade-avahi-ui-gtk3-debuginforedhat-upgrade-avahi-ui-tools-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.