Bug 245586 - (CVE-2007-3372) CVE-2007-3372 avahi: assert fail local DoS via D-Bus
CVE-2007-3372 avahi: assert fail local DoS via D-Bus
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
http://avahi.org/milestone/Avahi%200....
impact=low,source=cve,reported=200706...
: Security
Depends On: 476496
Blocks:
  Show dependency treegraph
 
Reported: 2007-06-25 11:52 EDT by Red Hat Product Security
Modified: 2009-10-23 15:05 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-01-08 12:07:23 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Patch used by Ubuntu in USN-696 (1.22 KB, patch)
2009-01-08 04:27 EST, Tomas Hoger
no flags Details | Diff

  None (edit)
Description Lubomir Kundrak 2007-06-25 11:52:20 EDT
Description of problem:

Avahi 0.6.20 was issued fixing a local Denial of Service flaw, where a local
attacker could crash Avahi daemon by sending a crafted message via D-Bus.
Comment 2 Tomas Hoger 2008-12-19 03:27:46 EST
Upstream fix:
http://avahi.org/changeset/b5daab9d464d239b0bf24379c6472ba09af35f66
Comment 5 Tomas Hoger 2009-01-08 03:51:14 EST
Original report with PoC:
http://lists.freedesktop.org/archives/avahi/2007-May/001058.html
Comment 7 Tomas Hoger 2009-01-08 04:27:50 EST
Created attachment 328453 [details]
Patch used by Ubuntu in USN-696

http://www.ubuntu.com/usn/usn-696-1
Comment 8 Tomas Hoger 2009-01-08 04:30:56 EST
Looks like the issue may have been introduced in 0.6.17 via following commit:
http://avahi.org/changeset/8b792d513254e334b7ead4e47dd3f37b23b06e77

Older versions use dbus_message_iter_get_array_len() and set k to "" when empty array is received.
Comment 9 Tomas Hoger 2009-01-08 12:07:23 EST
Confirmed with upstream that this issue was indeed introduced in 0.6.17, as is now noted on the upstream security page:
  http://avahi.org/wiki/AvahiSecurity

avahi version shipped in Red Hat Enterprise Linux 5 is 0.6.16 and was not affected by this flaw.  All current Fedora versions ship post-0.6.20 version and therefore have the fix included.
Comment 10 Red Hat Bugzilla 2009-10-23 15:05:43 EDT
Reporter changed to security-response-team@redhat.com by request of Jay Turner.

Note You need to log in before you can comment on or make changes to this bug.