Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ffax-863u-skce
Vulnerability ID VCID-ffax-863u-skce
Aliases CVE-2008-5081
Summary A Denial of Service vulnerability has been discovered in Avahi.
Status Published
Exploitability 2.0
Weighted Severity 4.5
Risk 9.0
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
http://avahi.org/milestone/Avahi%200.6.24
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5081.json
https://api.first.org/data/v1/epss?cve=CVE-2008-5081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081
http://secunia.com/advisories/33153
http://secunia.com/advisories/33220
http://secunia.com/advisories/33279
http://secunia.com/advisories/33475
http://security.gentoo.org/glsa/glsa-200901-11.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9987
https://www.exploit-db.com/exploits/7520
http://www.debian.org/security/2008/dsa-1690
http://www.openwall.com/lists/oss-security/2008/12/14/1
http://www.securityfocus.com/bid/32825
http://www.ubuntu.com/usn/usn-696-1
475964 https://bugzilla.redhat.com/show_bug.cgi?id=475964
508700 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508700
cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:*:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.1:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.2:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.3:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.4:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.5:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.10:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.11:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.12:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.13:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.14:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.15:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.16:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.17:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.18:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.19:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.20:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.21:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.22:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.5:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.6:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.7:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.8:*:*:*:*:*:*:*
cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avahi:avahi:0.6.9:*:*:*:*:*:*:*
CVE-2008-5081 https://nvd.nist.gov/vuln/detail/CVE-2008-5081
GLSA-200901-11 https://security.gentoo.org/glsa/200901-11
OSVDB-50929;CVE-2008-5081 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/7520.c
RHSA-2009:0013 https://access.redhat.com/errata/RHSA-2009:0013
USN-696-1 https://usn.ubuntu.com/696-1/
Data source Exploit-DB
Date added Dec. 18, 2008
Description Avahi < 0.6.24 - mDNS Daemon Remote Denial of Service
Ransomware campaign use Known
Source publication date Dec. 19, 2008
Exploit type dos
Platform multiple
Data source Metasploit
Description Avahi-daemon versions prior to 0.6.24 can be DoS'd with an mDNS packet with a source port of 0.
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability: []
Ransomware campaign use Unknown
Source publication date Nov. 14, 2008
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/mdns/avahi_portzero.rb
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-5081
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.98956
EPSS Score 0.77078
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:01:17.869736+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/200901-11 38.0.0