Multiple vulnerabilities have been found in mDNSResponder, which could lead to execution of arbitrary code with root privileges.
Package | net-misc/mDNSResponder on all architectures |
---|---|
Affected versions | < 212.1 |
Unaffected versions | >= 212.1 |
mDNSResponder is a component of Apple's Bonjour, an initiative for zero-configuration networking.
Multiple vulnerabilities have been discovered in mDNSResponder. Please review the CVE identifiers referenced below for details.
A local or remote attacker may be able to execute arbitrary code with root privileges or cause a Denial of Service.
There is no known workaround at this time.
All mDNSResponder users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/mDNSResponder-212.1"
NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is already no longer affected by this issue.
Release date
January 22, 2012
Latest revision
January 22, 2012: 1
Severity
high
Exploitable
local, remote
Bugzilla entries