CVE-2007-3372 Affecting avahi package, versions <0.6.20-2
Threat Intelligence
EPSS
2.51% (91st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-AVAHI-516044
- published 22 Jun 2007
- disclosed 22 Jun 2007
Introduced: 22 Jun 2007
CVE-2007-3372 Open this link in a new tabHow to fix?
Upgrade Debian:11
avahi
to version 0.6.20-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream avahi
package and not the avahi
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
References
- https://security-tracker.debian.org/tracker/CVE-2007-3372
- http://www.securityfocus.com/archive/1/472443/100/0/threaded
- http://avahi.org/changeset/1482
- http://avahi.org/milestone/Avahi%200.6.20
- http://www.debian.org/security/2008/dsa-1690
- http://osvdb.org/37507
- http://secunia.com/advisories/25811
- http://secunia.com/advisories/26083
- http://secunia.com/advisories/26791
- http://secunia.com/advisories/33220
- http://secunia.com/advisories/33279
- http://www.securityfocus.com/bid/24614
- http://www.securitytracker.com/id?1018706
- http://www.novell.com/linux/security/advisories/2007_14_sr.html
- http://www.ubuntu.com/usn/usn-696-1
- http://www.vupen.com/english/advisories/2007/2317
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35036
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:185
CVSS Scores
version 3.1