A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | Avahi: avahi wide-area dns predictable transaction ids |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Sat, 16 Nov 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | |
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | |
Weaknesses | CWE-334 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-14T11:51:58.469Z
Reserved: 2024-11-15T08:38:03.183Z
Link: CVE-2024-52616

Updated: 2024-11-21T21:07:25.594Z

Status : Received
Published: 2024-11-21T21:15:24.140
Modified: 2024-11-21T21:15:24.140
Link: CVE-2024-52616
