Description
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1515-1 | New libnet-dns-perl packages fix several vulnerabilities |
EUVD |
EUVD-2007-3367 | Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. |
Ubuntu USN |
USN-483-1 | libnet-dns-perl vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:14:12.944Z
Reserved: 2007-06-25T00:00:00.000Z
Link: CVE-2007-3377
No data.
Status : Deferred
Published: 2007-06-25T21:30:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3377
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN