CVE-2026-24401

6.5 MEDIUM

📋 TL;DR

A vulnerability in Avahi versions 0.9rc2 and below allows remote attackers to crash the avahi-daemon service via a specially crafted mDNS response containing a recursive CNAME record. This causes a segmentation fault due to unbounded recursion in the lookup_handle_cname function, leading to stack exhaustion. The vulnerability affects systems using Avahi with AVAHI_LOOKUP_USE_MULTICAST enabled, including those using nss-mdns for service discovery.

💻 Affected Systems

Products:
  • Avahi
Versions: Versions 0.9rc2 and below
Operating Systems: Linux distributions with Avahi installed
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects record browsers where AVAHI_LOOKUP_USE_MULTICAST is set explicitly, which includes record browsers created by resolvers used by nss-mdns.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Denial of service on the Avahi daemon, disrupting local network service discovery and potentially affecting applications relying on mDNS/DNS-SD for network services.

🟠

Likely Case

Service disruption causing temporary loss of local network service discovery capabilities until the daemon is restarted.

🟢

If Mitigated

Minimal impact if Avahi is not used or if network filtering prevents malicious mDNS packets from reaching vulnerable systems.

🌐 Internet-Facing: LOW - mDNS typically operates on local networks and is not exposed to the internet by default.
🏢 Internal Only: MEDIUM - Attackers on the local network can exploit this to disrupt service discovery, but impact is limited to denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a malicious mDNS response packet to the target system, which can be done from the local network without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 78eab31128479f06e30beb8c1cbf99dd921e2524 and later versions

Vendor Advisory: https://github.com/avahi/avahi/security/advisories/GHSA-h4vp-5m8j-f6w3

Restart Required: Yes

Instructions:

1. Update Avahi to a patched version from your distribution's repositories. 2. Restart the avahi-daemon service: 'sudo systemctl restart avahi-daemon' or 'sudo service avahi-daemon restart'.

🔧 Temporary Workarounds

Disable Avahi if not needed

linux

Stop and disable the Avahi daemon if mDNS service discovery is not required on the system.

sudo systemctl stop avahi-daemon
sudo systemctl disable avahi-daemon

Network filtering

linux

Block mDNS traffic (UDP port 5353) from untrusted networks using firewall rules.

sudo iptables -A INPUT -p udp --dport 5353 -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems running Avahi from untrusted networks.
  • Monitor for avahi-daemon crashes and restart the service automatically if disruption occurs.

🔍 How to Verify

Check if Vulnerable:

Check Avahi version: 'avahi-daemon --version' or 'dpkg -l | grep avahi' on Debian/Ubuntu, 'rpm -q avahi' on RHEL/CentOS. If version is 0.9rc2 or earlier, system is vulnerable.

Check Version:

avahi-daemon --version 2>/dev/null || dpkg -l | grep avahi || rpm -q avahi

Verify Fix Applied:

Verify Avahi version is newer than 0.9rc2 and check commit hash includes 78eab31128479f06e30beb8c1cbf99dd921e2524.

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in system logs related to avahi-daemon
  • Avahi daemon crash logs in /var/log/syslog or journalctl

Network Indicators:

  • Unusual mDNS traffic with recursive CNAME records
  • Multiple mDNS responses from single sources

SIEM Query:

source="syslog" AND ("avahi-daemon" AND ("segmentation fault" OR "SIGSEGV"))

🔗 References

📤 Share & Export