CVE-2007-3409

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc Broken Link
http://osvdb.org/37054 Broken Link
http://rt.cpan.org/Public/Bug/Display.html?id=27285 Broken Link
http://secunia.com/advisories/25829 Broken Link
http://secunia.com/advisories/26012 Broken Link
http://secunia.com/advisories/26014 Broken Link
http://secunia.com/advisories/26055 Broken Link
http://secunia.com/advisories/26075 Broken Link
http://secunia.com/advisories/26211 Broken Link
http://secunia.com/advisories/26231 Broken Link
http://secunia.com/advisories/26417 Broken Link
http://secunia.com/advisories/26543 Broken Link
http://secunia.com/advisories/29354 Broken Link
http://www.debian.org/security/2008/dsa-1515 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 Third Party Advisory
http://www.net-dns.org/docs/Changes.html Release Notes
http://www.novell.com/linux/security/advisories/2007_17_sr.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0674.html Broken Link
http://www.securityfocus.com/archive/1/473871/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24669 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018376 Broken Link Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0023/ Broken Link
http://www.ubuntu.com/usn/usn-483-1 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc Broken Link
http://osvdb.org/37054 Broken Link
http://rt.cpan.org/Public/Bug/Display.html?id=27285 Broken Link
http://secunia.com/advisories/25829 Broken Link
http://secunia.com/advisories/26012 Broken Link
http://secunia.com/advisories/26014 Broken Link
http://secunia.com/advisories/26055 Broken Link
http://secunia.com/advisories/26075 Broken Link
http://secunia.com/advisories/26211 Broken Link
http://secunia.com/advisories/26231 Broken Link
http://secunia.com/advisories/26417 Broken Link
http://secunia.com/advisories/26543 Broken Link
http://secunia.com/advisories/29354 Broken Link
http://www.debian.org/security/2008/dsa-1515 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 Third Party Advisory
http://www.net-dns.org/docs/Changes.html Release Notes
http://www.novell.com/linux/security/advisories/2007_17_sr.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0674.html Broken Link
http://www.securityfocus.com/archive/1/473871/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24669 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018376 Broken Link Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0023/ Broken Link
http://www.ubuntu.com/usn/usn-483-1 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:net-dns:net\:\:dns:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

History

21 Nov 2024, 00:33

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - Broken Link () ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - Broken Link
References () http://osvdb.org/37054 - Broken Link () http://osvdb.org/37054 - Broken Link
References () http://rt.cpan.org/Public/Bug/Display.html?id=27285 - Broken Link () http://rt.cpan.org/Public/Bug/Display.html?id=27285 - Broken Link
References () http://secunia.com/advisories/25829 - Broken Link () http://secunia.com/advisories/25829 - Broken Link
References () http://secunia.com/advisories/26012 - Broken Link () http://secunia.com/advisories/26012 - Broken Link
References () http://secunia.com/advisories/26014 - Broken Link () http://secunia.com/advisories/26014 - Broken Link
References () http://secunia.com/advisories/26055 - Broken Link () http://secunia.com/advisories/26055 - Broken Link
References () http://secunia.com/advisories/26075 - Broken Link () http://secunia.com/advisories/26075 - Broken Link
References () http://secunia.com/advisories/26211 - Broken Link () http://secunia.com/advisories/26211 - Broken Link
References () http://secunia.com/advisories/26231 - Broken Link () http://secunia.com/advisories/26231 - Broken Link
References () http://secunia.com/advisories/26417 - Broken Link () http://secunia.com/advisories/26417 - Broken Link
References () http://secunia.com/advisories/26543 - Broken Link () http://secunia.com/advisories/26543 - Broken Link
References () http://secunia.com/advisories/29354 - Broken Link () http://secunia.com/advisories/29354 - Broken Link
References () http://www.debian.org/security/2008/dsa-1515 - Mailing List, Third Party Advisory () http://www.debian.org/security/2008/dsa-1515 - Mailing List, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - Third Party Advisory
References () http://www.net-dns.org/docs/Changes.html - Release Notes () http://www.net-dns.org/docs/Changes.html - Release Notes
References () http://www.novell.com/linux/security/advisories/2007_17_sr.html - Broken Link () http://www.novell.com/linux/security/advisories/2007_17_sr.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2007-0674.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2007-0674.html - Broken Link
References () http://www.securityfocus.com/archive/1/473871/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/473871/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/24669 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/24669 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018376 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018376 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.trustix.org/errata/2007/0023/ - Broken Link () http://www.trustix.org/errata/2007/0023/ - Broken Link
References () http://www.ubuntu.com/usn/usn-483-1 - Third Party Advisory () http://www.ubuntu.com/usn/usn-483-1 - Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - Broken Link

03 Feb 2024, 02:30

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : unknown
v2 : 4.3
v3 : 7.5
CWE NVD-CWE-Other CWE-674
First Time Canonical
Canonical ubuntu Linux
Debian debian Linux
Debian
Net-dns
Net-dns net\
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - Broken Link
References (TRUSTIX) http://www.trustix.org/errata/2007/0023/ - (TRUSTIX) http://www.trustix.org/errata/2007/0023/ - Broken Link
References (SECUNIA) http://secunia.com/advisories/25829 - (SECUNIA) http://secunia.com/advisories/25829 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26055 - (SECUNIA) http://secunia.com/advisories/26055 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0674.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0674.html - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1018376 - (SECTRACK) http://www.securitytracker.com/id?1018376 - Broken Link, Third Party Advisory, VDB Entry
References (UBUNTU) http://www.ubuntu.com/usn/usn-483-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-483-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/26231 - (SECUNIA) http://secunia.com/advisories/26231 - Broken Link
References (SECUNIA) http://secunia.com/advisories/29354 - (SECUNIA) http://secunia.com/advisories/29354 - Broken Link
References (OSVDB) http://osvdb.org/37054 - (OSVDB) http://osvdb.org/37054 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2007_17_sr.html - (SUSE) http://www.novell.com/linux/security/advisories/2007_17_sr.html - Broken Link
References (SGI) ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - (SGI) ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - Broken Link
References (SECUNIA) http://secunia.com/advisories/26417 - (SECUNIA) http://secunia.com/advisories/26417 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26012 - (SECUNIA) http://secunia.com/advisories/26012 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/473871/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/473871/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://rt.cpan.org/Public/Bug/Display.html?id=27285 - (CONFIRM) http://rt.cpan.org/Public/Bug/Display.html?id=27285 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26543 - (SECUNIA) http://secunia.com/advisories/26543 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26211 - (SECUNIA) http://secunia.com/advisories/26211 - Broken Link
References (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/26014 - (SECUNIA) http://secunia.com/advisories/26014 - Broken Link
References (DEBIAN) http://www.debian.org/security/2008/dsa-1515 - (DEBIAN) http://www.debian.org/security/2008/dsa-1515 - Mailing List, Third Party Advisory
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/24669 - (BID) http://www.securityfocus.com/bid/24669 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/26075 - (SECUNIA) http://secunia.com/advisories/26075 - Broken Link
References (CONFIRM) http://www.net-dns.org/docs/Changes.html - (CONFIRM) http://www.net-dns.org/docs/Changes.html - Release Notes
CPE cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*
cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:a:net-dns:net\:\:dns:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

Information

Published : 2007-06-26 18:30

Updated : 2024-11-21 00:33


NVD link : CVE-2007-3409

Mitre link : CVE-2007-3409

CVE.ORG link : CVE-2007-3409


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

net-dns

  • net\
CWE
CWE-674

Uncontrolled Recursion