avahi CVE Vulnerabilities & Metrics

Focus on avahi vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About avahi Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with avahi. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total avahi CVEs: 10
Earliest CVE date: 10 May 2006, 02:14 UTC
Latest CVE date: 02 Nov 2023, 16:15 UTC

Latest CVE reference: CVE-2023-38473

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical avahi CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.75

Max CVSS: 7.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 6
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS avahi CVEs

These are the five CVEs with the highest CVSS scores for avahi, sorted by severity first and recency.

All CVEs for avahi

CVE-2023-38473 avahi vulnerability CVSS: 0 02 Nov 2023, 16:15 UTC

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.

CVE-2023-38472 avahi vulnerability CVSS: 0 02 Nov 2023, 15:15 UTC

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.

CVE-2023-38471 avahi vulnerability CVSS: 0 02 Nov 2023, 15:15 UTC

A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.

CVE-2023-38470 avahi vulnerability CVSS: 0 02 Nov 2023, 15:15 UTC

A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.

CVE-2023-38469 avahi vulnerability CVSS: 0 02 Nov 2023, 15:15 UTC

A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.

CVE-2023-1981 avahi vulnerability CVSS: 0 26 May 2023, 18:15 UTC

A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.

CVE-2021-3468 avahi vulnerability CVSS: 2.1 02 Jun 2021, 16:15 UTC

A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

CVE-2021-3502 avahi vulnerability CVSS: 2.1 07 May 2021, 12:15 UTC

A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.

CVE-2021-26720 avahi vulnerability CVSS: 4.6 17 Feb 2021, 22:15 UTC

avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.

CVE-2017-6519 avahi vulnerability CVSS: 6.4 01 May 2017, 01:59 UTC

avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.

CVE-2011-1002 avahi vulnerability CVSS: 5.0 22 Feb 2011, 19:00 UTC

avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.

CVE-2010-2244 avahi vulnerability CVSS: 4.3 08 Jul 2010, 12:54 UTC

The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.

CVE-2009-0758 avahi vulnerability CVSS: 7.8 03 Mar 2009, 16:30 UTC

The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.

CVE-2008-5081 avahi vulnerability CVSS: 5.0 17 Dec 2008, 02:30 UTC

The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.

CVE-2007-3372 avahi vulnerability CVSS: 2.1 22 Jun 2007, 21:30 UTC

The Avahi daemon in Avahi before 0.6.20 allows attackers to cause a denial of service (exit) via empty TXT data over D-Bus, which triggers an assert error.

CVE-2006-6870 avahi vulnerability CVSS: 5.0 31 Dec 2006, 05:00 UTC

The consume_labels function in avahi-core/dns.c in Avahi before 0.6.16 allows remote attackers to cause a denial of service (infinite loop) via a crafted compressed DNS response with a label that points to itself.

CVE-2006-5461 avahi vulnerability CVSS: 2.1 14 Nov 2006, 22:07 UTC

Avahi before 0.6.15 does not verify the sender identity of netlink messages to ensure that they come from the kernel instead of another process, which allows local users to spoof network changes to Avahi.

CVE-2006-2288 avahi vulnerability CVSS: 3.6 10 May 2006, 02:14 UTC

Avahi before 0.6.10 allows local users to cause a denial of service (mDNS/DNS-SD service disconnect) via unspecified mDNS name conflicts.

CVE-2006-2289 avahi vulnerability CVSS: 2.1 10 May 2006, 02:14 UTC

Buffer overflow in avahi-core in Avahi before 0.6.10 allows local users to execute arbitrary code via unknown vectors.