Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - Broken Link | |
References | () http://osvdb.org/37054 - Broken Link | |
References | () http://rt.cpan.org/Public/Bug/Display.html?id=27285 - Broken Link | |
References | () http://secunia.com/advisories/25829 - Broken Link | |
References | () http://secunia.com/advisories/26012 - Broken Link | |
References | () http://secunia.com/advisories/26014 - Broken Link | |
References | () http://secunia.com/advisories/26055 - Broken Link | |
References | () http://secunia.com/advisories/26075 - Broken Link | |
References | () http://secunia.com/advisories/26211 - Broken Link | |
References | () http://secunia.com/advisories/26231 - Broken Link | |
References | () http://secunia.com/advisories/26417 - Broken Link | |
References | () http://secunia.com/advisories/26543 - Broken Link | |
References | () http://secunia.com/advisories/29354 - Broken Link | |
References | () http://www.debian.org/security/2008/dsa-1515 - Mailing List, Third Party Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - Third Party Advisory | |
References | () http://www.net-dns.org/docs/Changes.html - Release Notes | |
References | () http://www.novell.com/linux/security/advisories/2007_17_sr.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0674.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/473871/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/24669 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1018376 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.trustix.org/errata/2007/0023/ - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-483-1 - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - Broken Link |
03 Feb 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
CWE | CWE-674 | |
First Time |
Canonical
Canonical ubuntu Linux Debian debian Linux Debian Net-dns Net-dns net\ |
|
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595 - Broken Link | |
References | (TRUSTIX) http://www.trustix.org/errata/2007/0023/ - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/25829 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26055 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0674.html - Broken Link | |
References | (SECTRACK) http://www.securitytracker.com/id?1018376 - Broken Link, Third Party Advisory, VDB Entry | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-483-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/26231 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/29354 - Broken Link | |
References | (OSVDB) http://osvdb.org/37054 - Broken Link | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2007_17_sr.html - Broken Link | |
References | (SGI) ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26417 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26012 - Broken Link | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/473871/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://rt.cpan.org/Public/Bug/Display.html?id=27285 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26543 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26211 - Broken Link | |
References | (GENTOO) http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/26014 - Broken Link | |
References | (DEBIAN) http://www.debian.org/security/2008/dsa-1515 - Mailing List, Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:146 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/24669 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/26075 - Broken Link | |
References | (CONFIRM) http://www.net-dns.org/docs/Changes.html - Release Notes | |
CPE | cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:* cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:* |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* cpe:2.3:a:net-dns:net\:\:dns:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
Information
Published : 2007-06-26 18:30
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3409
Mitre link : CVE-2007-3409
CVE.ORG link : CVE-2007-3409
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
net-dns
- net\
CWE
CWE-674
Uncontrolled Recursion