Mailinglist Archive: opensuse-bugs (4292 mails)

< Previous Next >
[Bug 1037001] VUL-0: CVE-2017-6519: avahi: Multicast DNS responds to unicast queries outside of local network
  • From: bugzilla_noreply@xxxxxxxxxx
  • Date: Mon, 01 May 2017 08:15:49 +0000
  • Message-id: <>

--- Comment #1 from Mikhail Kasimov <mikhail.kasimov@xxxxxxxxx> ---
Avahi IPv6 Off-link Unicast mDNS Interaction

Advisory Number: 201701

Assigned CVE: CVE-2017-6519

Affected software / systems: Avahi daemon. Avahi daemon used in various popular
Linux OS (and other open source Operating Systems). Vulnerability has been
confirmed in latest (as of Feb 22, 2017) Centos 6, Centos 7, Fedora 25, Ubuntu

Attack type: Remote

- DDoS amplification attacks and other remote DoS attacks.
- Information disclosure

Description: Avahi through 0.6.32 inadvertently responds to IPv6 unicast
queries with source addresses that are not on-link, which allows remote
attackers to cause a denial of service (traffic amplification) or obtain
potentially sensitive information via port-5353 UDP packets.
According to IETF RFC 6762 section 5.5, "Since it is possible for a unicast
query to be received from a machine outside the local link, responders SHOULD
check that the source address in the query packet matches the local subnet for
that link (or, in the case of IPv6, the source address has an on-link prefix)
and silently ignore the packet if not."

Reference: A. Atlasis, “An Attack-in-Depth Analysis of multicast DNS and DNS
Service Discovery, Hack In the Box, Amsterdam, 14th April 2017.

Similar Vulnerabilities:
- CERT-VN:VU#550620
- CVE-2015-2809
- CVE-2017-6520

Mitigation: Block at the perimeter UDP port 5353 both for incoming and outgoing

Note: RedHat developers do not consider it a bug (see

You are receiving this mail because:
You are on the CC list for the bug.
< Previous Next >