A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Wed, 14 May 2025 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb cpe:/o:redhat:enterprise_linux:9::baseos |
|
References |
|
Thu, 21 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | Avahi: avahi wide-area dns predictable transaction ids |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
References |
|
Sat, 16 Nov 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | |
Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | |
Weaknesses | CWE-334 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-05-13T23:50:12.711Z
Reserved: 2024-11-15T08:38:03.183Z
Link: CVE-2024-52616

Updated: 2024-11-21T21:07:25.594Z

Status : Awaiting Analysis
Published: 2024-11-21T21:15:24.140
Modified: 2025-05-14T00:15:17.520
Link: CVE-2024-52616
