Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Updated: March 31, 2015
Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
According to the researcher, avahi 0.6.31 may not be affected. Previous versions are known to be affected; see avahi mailing list post above.
Notified: February 10, 2015 Updated: April 08, 2015
Statement Date: March 20, 2015
Affected
No statement is currently available from the vendor regarding this vulnerability.
The Canon MG6200 series will respond to WAN unicast queries. Canon has provided more information for securing its printers to its customers at the URL below:
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: March 31, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 10, 2015 Updated: March 25, 2015
Statement Date: March 25, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: March 20, 2015
Statement Date: March 20, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 10, 2015 Updated: March 31, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: March 20, 2015
Statement Date: March 20, 2015
Affected
No statement is currently available from the vendor regarding this vulnerability.
Previous generations of HP printing products may use an implementation of mDNS for device discovery on the network which allows detection outside the local network segment. While this implementation is not recommended by RFC 6762 Section 5.5, it is allowed within the specification. HP’s networking infrastructure for its current device fleet uses an Apple Bonjour implementation with Bonjour. For customers concerned with mDNS use on their network, HP recommends filtering mDNS on UDP Port 5353 at the network perimeter. If desired the customer can manually disable mDNS on supported products using the embedded web server (EWS) configuration functionality (such as the Color LaserJet 4700, Figure A), however this may impact device discovery features including AirPrint, Mopria, and Google Cloud Print 2.0.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: March 31, 2015
Statement Date: February 17, 2015
Affected
"IBM i is not impacted as we do not support mDNS."
IBM i does not support mDNS according to the vendor, however IBM has released an advisory for their Security Access Manager product (CVE-2015-1892 ; see URL below).
Notified: February 10, 2015 Updated: March 09, 2015
Statement Date: March 05, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 27, 2015 Updated: February 27, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: May 15, 2015
Statement Date: May 15, 2015
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
Ricoh Company Ltd. has investigated all of its products, and there are no Ricoh products affected by this vulnerability. Also, none of its products uses Avahi.
Notified: February 10, 2015 Updated: March 31, 2015
Statement Date: February 16, 2015
Affected
This vulnerability "has been patched already since 2011 (DSM 3.1 & later versions). ... Despite of that, we will still upgrade avahi to 0.6.31 on the latest DSM 5.2 beta release and further versions."
We are not aware of further vendor information regarding this vulnerability.
While recent versions do not appear vulnerable, if you are running old software, please update to the latest version.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: February 10, 2015 Updated: February 10, 2015
Unknown
No statement is currently available from the vendor regarding this vulnerability.