CPANSA-Net-DNS-2007-3377: Net-DNS vulnerability

Publisher giterlizzi Document category csaf_security_advisory
Initial release date 2007-06-25T00:00:00 Engine CSAF Perl Toolkit 0.25
Current release date 2007-06-25T00:00:00 Build Date
Current version 1 Status final
CVSS v3.1 Base Score Severity
Original language Language en
Also referred to

Vulnerability Description

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

Vulnerabilities

CVE-2007-3377

Vulnerability Description

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

Product status

Known affected
Product Score
Net-DNS less than 0.60
CVSS Version CVSS Vector CVSS Base Score CVSS Base Severity
2.0 AV:N/AC:M/Au:N/C:N/I:P/A:N 4.3 Medium
Fixed

giterlizzi

Namespace: https://github.com/giterlizzi/

gdt@cpan.org

References

Revision history

Version Date of the revision Summary of the revision
1 Mon Jun 25 00:00:00 2007 First release

Sharing rules

TLP:WHITE
For the TLP version see: https://www.first.org/tlp/