Files
CVEs-PoC/2017/CVE-2017-6519.md
T
2025-09-29 21:09:30 +02:00

18 lines
855 B
Markdown

### [CVE-2017-6519](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
### POC
#### Reference
- https://usn.ubuntu.com/3876-2/
#### Github
No PoCs found on GitHub currently.