Summary
The remote host is missing an update to avahi
announced via advisory DSA 2174-1.
Solution
For the oldstable distribution (lenny), this problem has been fixed in version 0.6.23-3lenny3.
For the stable distribution (squeeze), this problem has been fixed in version 0.6.27-2+squeeze1.
For the testing (wheezy) and unstable distribution (sid), this problem has been fixed in version 0.6.28-4.
We recommend that you upgrade your avahi packages.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202174-1
Insight
It was discovered that avahi, an implementation of the zeroconf protocol, can be crashed remotely by a single UDP packet, which may result in a denial of service.
Severity
Classification
-
CVE CVE-2011-1002 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities