CVE-2024-52616
Publication date 21 November 2024
Last updated 11 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Read the notes from the security team
Why is this CVE low priority?
This is a low severity issue with a work-around
Mitigation
This issue can be mitigated by disabling wide-area DNS queries. This can be done by setting enable-wide-are=no in /etc/avahi/avahi-daemon.conf
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| avahi | 25.10 questing |
Vulnerable
|
| 24.04 LTS noble |
Vulnerable
|
|
| 22.04 LTS jammy |
Vulnerable
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty | Ignored end of ESM support, was needs-triage |
Notes
mdeslaur
Upstream has disabled wide-area by default: https://github.com/avahi/avahi/pull/577 Another bug exists to track improving wide-area: https://github.com/avahi/avahi/issues/578
Patch details
| Package | Patch details |
|---|---|
| avahi |
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | Low |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |