VYPR
Critical severity9.1NVD Advisory· Published May 1, 2017· Updated May 13, 2026

CVE-2017-6519

CVE-2017-6519

Description

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

Affected products

7
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 4 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
  • Avahi/Avahi2 versions
    cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*range: <=0.6.32
    • cpe:2.3:a:avahi:avahi:0.7:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.