CVE-2006-5461
Summary
| CVE | CVE-2006-5461 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-11-14 22:07:00 UTC |
| Updated | 2018-10-03 21:45:00 UTC |
| Description | Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Milestone Avahi 0.6.15 - Avahi - Trac | CONFIRM | avahi.org | |
| Security Announcement | SUSE | www.novell.com | |
| Gentoo Linux Documentation -- Avahi: "netlink" message vulnerability | GENTOO | www.gentoo.org | |
| USN-380-1: Avahi vulnerability | Ubuntu security notices | UBUNTU | usn.ubuntu.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| SUSE Update for Multiple Packages - Advisories - Secunia | SECUNIA | secunia.com | |
| Avahi Unauthorized Data Manipulation Vulnerability | BID | www.securityfocus.com | |
| Avahi Lets Remote Users Manipulate the Service By Spoofing Netlink Messages - SecurityTracker | SECTRACK | securitytracker.com | |
| Mandriva update for avahi - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| Gentoo update for avahi - Advisories - Secunia | SECUNIA | secunia.com | |
| http://0pointer.net/ | MLIST | tango.0pointer.de | |
| Ubuntu update for avahi - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Avahi "netlink" Message Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.