blob: 302a5bc7b1cceaa2561105e0c5fc77f32c019a6a (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200611-13">
<title>Avahi: "netlink" message vulnerability</title>
<synopsis>
Avahi fails to verify the origin of netlink messages, which could allow
local users to spoof network changes.
</synopsis>
<product type="ebuild">avahi</product>
<announced>2006-11-20</announced>
<revised>2006-11-20: 01</revised>
<bug>154322</bug>
<access>local</access>
<affected>
<package name="net-dns/avahi" auto="yes" arch="*">
<unaffected range="ge">0.6.15</unaffected>
<vulnerable range="lt">0.6.15</vulnerable>
</package>
</affected>
<background>
<p>
Avahi is a system that facilitates service discovery on a local
network.
</p>
</background>
<description>
<p>
Avahi does not check that the netlink messages come from the kernel
instead of a user-space process.
</p>
</description>
<impact type="normal">
<p>
A local attacker could exploit this vulnerability by crafting malicious
netlink messages and trick Avahi to react to fake network changes. This
could lead users to connect to untrusted services without knowing.
</p>
</impact>
<workaround>
<p>
There is no known workaround at this time.
</p>
</workaround>
<resolution>
<p>
All Avahi users should upgrade to the latest version:
</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.15"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5461">CVE-2006-5461</uri>
</references>
<metadata tag="requester" timestamp="2006-11-16T11:46:25Z">
vorlon
</metadata>
<metadata tag="bugReady" timestamp="2006-11-16T11:47:51Z">
vorlon
</metadata>
<metadata tag="submitter" timestamp="2006-11-20T08:40:32Z">
jaervosz
</metadata>
</glsa>
|