Vulnerabilities > CVE-2007-3372 - Unspecified vulnerability in Avahi
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN avahi
nessus
Summary
The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_AVAHI-3845.NASL description Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 29383 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29383 title SuSE 10 Security Update : avahi (ZYPP Patch Number 3845) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(29383); script_version ("1.12"); script_cvs_date("Date: 2019/10/25 13:36:29"); script_cve_id("CVE-2007-3372"); script_name(english:"SuSE 10 Security Update : avahi (ZYPP Patch Number 3845)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 10 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue." ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2007-3372.html" ); script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 3845."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/07/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SLED10", sp:1, reference:"avahi-0.6.5-29.16")) flag++; if (rpm_check(release:"SLED10", sp:1, reference:"avahi-glib-0.6.5-29.16")) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get()); else security_note(0); exit(0); } else exit(0, "The host is not affected.");
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-696-1.NASL description Emanuele Aina discovered that Avahi did not properly validate its input when processing data over D-Bus. A local attacker could send an empty TXT message via D-Bus and cause a denial of service (failed assertion). This issue only affected Ubuntu 6.06 LTS. (CVE-2007-3372) Hugo Dias discovered that Avahi did not properly verify its input when processing mDNS packets. A remote attacker could send a crafted mDNS packet and cause a denial of service (assertion failure). (CVE-2008-5081). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 36657 published 2009-04-23 reporter Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36657 title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : avahi vulnerabilities (USN-696-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-696-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(36657); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:33:02"); script_cve_id("CVE-2007-3372", "CVE-2008-5081"); script_bugtraq_id(32825); script_xref(name:"USN", value:"696-1"); script_name(english:"Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : avahi vulnerabilities (USN-696-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "Emanuele Aina discovered that Avahi did not properly validate its input when processing data over D-Bus. A local attacker could send an empty TXT message via D-Bus and cause a denial of service (failed assertion). This issue only affected Ubuntu 6.06 LTS. (CVE-2007-3372) Hugo Dias discovered that Avahi did not properly verify its input when processing mDNS packets. A remote attacker could send a crafted mDNS packet and cause a denial of service (assertion failure). (CVE-2008-5081). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/696-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-autoipd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-daemon"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-dbg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-discover"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-dnsconfd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-ui-utils"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:avahi-utils"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-cil"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-client-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-client3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-common-data"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-common-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-common3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-howl-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-howl0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-libdnssd-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-compat-libdnssd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-core-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-core4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-core5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-glib-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-glib1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-gobject-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-gobject0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-qt3-1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-qt3-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-qt4-1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-qt4-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-ui-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libavahi-ui0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:monodoc-avahi-manual"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python-avahi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:python2.4-avahi"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.06:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.04:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.10"); script_set_attribute(attribute:"patch_publication_date", value:"2008/12/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(6\.06|7\.10|8\.04|8\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 6.06 / 7.10 / 8.04 / 8.10", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"6.06", pkgname:"avahi-daemon", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"avahi-discover", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"avahi-dnsconfd", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"avahi-utils", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-cil", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-client-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-client3", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-common-data", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-common-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-common3", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-compat-howl-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-compat-howl0", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-compat-libdnssd-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-compat-libdnssd1", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-core-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-core4", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-glib-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-glib1", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-qt3-1", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libavahi-qt3-dev", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"monodoc-avahi-manual", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"python2.4-avahi", pkgver:"0.6.10-0ubuntu3.5")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"avahi-autoipd", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"avahi-daemon", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"avahi-discover", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"avahi-dnsconfd", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"avahi-utils", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-client-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-client3", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-common-data", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-common-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-common3", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-compat-howl-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-compat-howl0", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-compat-libdnssd-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-compat-libdnssd1", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-core-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-core5", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-glib-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-glib1", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-qt3-1", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-qt3-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-qt4-1", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-qt4-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-ui-dev", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libavahi-ui0", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"python-avahi", pkgver:"0.6.20-2ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-autoipd", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-daemon", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-dbg", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-discover", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-dnsconfd", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"avahi-utils", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-client-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-client3", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-common-data", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-common-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-common3", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-compat-howl-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-compat-howl0", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-compat-libdnssd-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-compat-libdnssd1", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-core-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-core5", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-glib-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-glib1", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-gobject-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-gobject0", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-qt3-1", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-qt3-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-qt4-1", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-qt4-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-ui-dev", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libavahi-ui0", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"python-avahi", pkgver:"0.6.22-2ubuntu4.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-autoipd", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-daemon", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-dbg", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-discover", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-dnsconfd", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-ui-utils", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"avahi-utils", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-client-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-client3", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-common-data", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-common-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-common3", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-compat-howl-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-compat-howl0", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-compat-libdnssd-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-compat-libdnssd1", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-core-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-core5", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-glib-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-glib1", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-gobject-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-gobject0", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-qt3-1", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-qt3-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-qt4-1", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-qt4-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-ui-dev", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libavahi-ui0", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"python-avahi", pkgver:"0.6.23-2ubuntu2.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "avahi-autoipd / avahi-daemon / avahi-dbg / avahi-discover / etc"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1690.NASL description Two denial of service conditions were discovered in avahi, a Multicast DNS implementation. Huge Dias discovered that the avahi daemon aborts with an assert error if it encounters a UDP packet with source port 0 (CVE-2008-5081 ). It was discovered that the avahi daemon aborts with an assert error if it receives an empty TXT record over D-Bus (CVE-2007-3372 ). last seen 2020-06-01 modified 2020-06-02 plugin id 35253 published 2008-12-22 reporter This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/35253 title Debian DSA-1690-1 : avahi - assert errors code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1690. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(35253); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:32:21"); script_cve_id("CVE-2007-3372", "CVE-2008-5081"); script_bugtraq_id(32825); script_xref(name:"DSA", value:"1690"); script_name(english:"Debian DSA-1690-1 : avahi - assert errors"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Two denial of service conditions were discovered in avahi, a Multicast DNS implementation. Huge Dias discovered that the avahi daemon aborts with an assert error if it encounters a UDP packet with source port 0 (CVE-2008-5081 ). It was discovered that the avahi daemon aborts with an assert error if it receives an empty TXT record over D-Bus (CVE-2007-3372 )." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508700" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2008-5081" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/CVE-2007-3372" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2008/dsa-1690" ); script_set_attribute( attribute:"solution", value: "Upgrade the avahi packages. For the stable distribution (etch), these problems have been fixed in version 0.6.16-3etch2." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:avahi"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0"); script_set_attribute(attribute:"patch_publication_date", value:"2008/12/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2008/12/22"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"4.0", prefix:"avahi-autoipd", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"avahi-daemon", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"avahi-discover", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"avahi-dnsconfd", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"avahi-utils", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-client-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-client3", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-common-data", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-common-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-common3", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-compat-howl-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-compat-howl0", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-compat-libdnssd-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-compat-libdnssd1", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-core-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-core4", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-glib-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-glib1", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-qt3-1", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-qt3-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-qt4-1", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"libavahi-qt4-dev", reference:"0.6.16-3etch2")) flag++; if (deb_check(release:"4.0", prefix:"python-avahi", reference:"0.6.16-3etch2")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2007-185.NASL description The Avahi daemon in 0.6.20 and previous allows attackers to cause a denial of service via empty TXT data over D-Bus, which triggers an assert error. Updated packages have been patched to prevent this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 26105 published 2007-09-24 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26105 title Mandrake Linux Security Advisory : avahi (MDKSA-2007:185) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2007:185. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(26105); script_version ("1.15"); script_cvs_date("Date: 2019/08/02 13:32:49"); script_cve_id("CVE-2007-3372"); script_xref(name:"MDKSA", value:"2007:185"); script_name(english:"Mandrake Linux Security Advisory : avahi (MDKSA-2007:185)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandrake Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "The Avahi daemon in 0.6.20 and previous allows attackers to cause a denial of service via empty TXT data over D-Bus, which triggers an assert error. Updated packages have been patched to prevent this issue." ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi-dnsconfd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi-python"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi-sharp"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi-sharp-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:avahi-x11"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-client3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-client3-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-common3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-common3-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-compat-howl0-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-compat-libdns_sd1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-core4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-core4-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-core5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-core5-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-glib1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-glib1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-qt3_1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-qt3_1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-qt4_1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64avahi-qt4_1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-client3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-client3-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-common3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-common3-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-compat-howl0"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-compat-howl0-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-compat-libdns_sd1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-core4"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-core4-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-core5"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-core5-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-glib1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-glib1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-qt3_1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-qt3_1-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-qt4_1"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libavahi-qt4_1-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2007"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2007.1"); script_set_attribute(attribute:"patch_publication_date", value:"2007/09/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2007.0", reference:"avahi-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"avahi-dnsconfd-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"avahi-python-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"avahi-sharp-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", reference:"avahi-x11-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-client3-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-client3-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-common3-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-common3-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-compat-howl0-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-compat-howl0-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-compat-libdns_sd1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-compat-libdns_sd1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-core4-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-core4-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-glib1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-glib1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-qt3_1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-qt3_1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-qt4_1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"x86_64", reference:"lib64avahi-qt4_1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-client3-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-client3-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-common3-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-common3-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-compat-howl0-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-compat-howl0-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-compat-libdns_sd1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-compat-libdns_sd1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-core4-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-core4-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-glib1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-glib1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-qt3_1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-qt3_1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-qt4_1-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.0", cpu:"i386", reference:"libavahi-qt4_1-devel-0.6.13-4.3mdv2007.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-dnsconfd-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-python-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-sharp-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-sharp-doc-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", reference:"avahi-x11-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-client3-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-client3-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-common3-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-common3-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-compat-howl0-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-compat-howl0-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-compat-libdns_sd1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-compat-libdns_sd1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-core5-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-core5-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-glib1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-glib1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-qt3_1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-qt3_1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-qt4_1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"x86_64", reference:"lib64avahi-qt4_1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-client3-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-client3-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-common3-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-common3-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-compat-howl0-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-compat-howl0-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-compat-libdns_sd1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-compat-libdns_sd1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-core5-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-core5-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-glib1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-glib1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-qt3_1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-qt3_1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-qt4_1-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2007.1", cpu:"i386", reference:"libavahi-qt4_1-devel-0.6.17-1.1mdv2007.1", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get()); else security_note(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_AVAHI-3846.NASL description Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 27162 published 2007-10-17 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/27162 title openSUSE 10 Security Update : avahi (avahi-3846) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update avahi-3846. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(27162); script_version ("1.12"); script_cvs_date("Date: 2019/10/25 13:36:29"); script_cve_id("CVE-2007-3372"); script_name(english:"openSUSE 10 Security Update : avahi (avahi-3846)"); script_summary(english:"Check for the avahi-3846 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Local attackers could send empty TXT data via D-BUS, causing the avahi daemon to exit. CVE-2007-3372 has been assigned to this issue." ); script_set_attribute( attribute:"solution", value:"Update the affected avahi packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-compat-howl"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-compat-howl-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-compat-mDNSResponder"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-compat-mDNSResponder-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-glib"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-mono"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-qt3"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:avahi-qt4"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2"); script_set_attribute(attribute:"patch_publication_date", value:"2007/07/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/10/17"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE10\.1|SUSE10\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1 / 10.2", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE10.1", reference:"avahi-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-compat-howl-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-compat-howl-devel-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-compat-mDNSResponder-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-compat-mDNSResponder-devel-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-devel-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-glib-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-mono-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-qt3-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.1", reference:"avahi-qt4-0.6.5-29.16") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-compat-howl-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-compat-howl-devel-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-compat-mDNSResponder-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-compat-mDNSResponder-devel-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-devel-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-glib-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-mono-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-qt3-0.6.14-38") ) flag++; if ( rpm_check(release:"SUSE10.2", reference:"avahi-qt4-0.6.14-38") ) flag++; if (flag) { if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get()); else security_note(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "avahi"); }
Statements
contributor | Mark J Cox |
lastmodified | 2009-01-08 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of avahi as shipped with Red Hat Enterprise Linux 5. |
References
- http://avahi.org/milestone/Avahi%200.6.20
- http://avahi.org/changeset/1482
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:185
- http://www.novell.com/linux/security/advisories/2007_14_sr.html
- http://www.securityfocus.com/bid/24614
- http://www.securitytracker.com/id?1018706
- http://secunia.com/advisories/25811
- http://secunia.com/advisories/26083
- http://secunia.com/advisories/26791
- http://www.ubuntu.com/usn/usn-696-1
- http://secunia.com/advisories/33279
- http://www.debian.org/security/2008/dsa-1690
- http://secunia.com/advisories/33220
- http://www.vupen.com/english/advisories/2007/2317
- http://osvdb.org/37507
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35036
- http://www.securityfocus.com/archive/1/472443/100/0/threaded