A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 14 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Wed, 14 May 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb cpe:/o:redhat:enterprise_linux:9::baseos |
|
| References |
|
Thu, 21 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 Nov 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | Avahi: avahi wide-area dns predictable transaction ids |
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| References |
|
Sat, 16 Nov 2024 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs. | |
| Title | avahi: Avahi Wide-Area DNS Predictable Transaction IDs | |
| Weaknesses | CWE-334 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-11-21T20:41:11.636Z
Updated: 2025-08-30T17:50:13.659Z
Reserved: 2024-11-15T08:38:03.183Z
Link: CVE-2024-52616
Updated: 2024-11-21T21:07:25.594Z
Status : Awaiting Analysis
Published: 2024-11-21T21:15:24.140
Modified: 2025-05-14T00:15:17.520
Link: CVE-2024-52616