Description: | Description: The remote host is missing an update to avahi announced via advisory FEDORA-2011-11588.
Update Information:
Fixes CVE-2011-1002.
The MITRE CVE dictionary describes this issue as:
avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
Find out more about CVE-2011-1002 from the MITRE CVE dictionary and NIST NVD.
This also disables gtk3 support. Unfortunately gtk3 support in F14 is broken and Avahi cannot be compiled against it. Since gtk3 will not be fixed in F14 anymore and nobody uses it we instead disable it in Avahi.
References:
[ 1 ] Bug #667187 - CVE-2011-1002 avahi: daemon infinite loop triggered by an empty UDP packet (CVE-2010-2244 fix regression) https://bugzilla.redhat.com/show_bug.cgi?id=667187
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update avahi' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2011-11588
Risk factor : Medium
CVSS Score: 5.0
|