CVE-2024-52615

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52615.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52615
Related
Published
2024-11-21T21:15:23Z
Modified
2025-01-14T12:17:22.893614Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.

References

Affected packages

Debian:11 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-5
0.8-5+deb11u1
0.8-5+deb11u2
0.8-5+deb11u3
0.8-6
0.8-7
0.8-8
0.8-9
0.8-10
0.8-11
0.8-12
0.8-13
0.8-14
0.8-15
0.8-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-10
0.8-10+deb12u1
0.8-11
0.8-12
0.8-13
0.8-14
0.8-15
0.8-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / avahi

Package

Name
avahi
Purl
pkg:deb/debian/avahi?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8-10
0.8-11
0.8-12
0.8-13
0.8-14
0.8-15
0.8-16

Ecosystem specific

{
    "urgency": "not yet assigned"
}