First published: Tue Jun 26 2007(Updated: )
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
NLnet Labs NetDNS | =0.48_03 | |
NLnet Labs NetDNS | =0.46 | |
NLnet Labs NetDNS | =0.24 | |
NLnet Labs NetDNS | =0.45_01 | |
NLnet Labs NetDNS | =0.42_02 | |
NLnet Labs NetDNS | =0.35 | |
NLnet Labs NetDNS | =0.48_01 | |
NLnet Labs NetDNS | =0.59 | |
NLnet Labs NetDNS | =0.34_02 | |
NLnet Labs NetDNS | =0.14 | |
NLnet Labs NetDNS | =0.51 | |
NLnet Labs NetDNS | =0.41 | |
NLnet Labs NetDNS | =0.49 | |
NLnet Labs NetDNS | =0.47 | |
NLnet Labs NetDNS | =0.29 | |
NLnet Labs NetDNS | =0.23 | |
NLnet Labs NetDNS | =0.38 | |
NLnet Labs NetDNS | =0.42 | |
NLnet Labs NetDNS | =0.49_03 | |
NLnet Labs NetDNS | =0.37 | |
NLnet Labs NetDNS | =0.38_02 | |
NLnet Labs NetDNS | =0.33 | |
NLnet Labs NetDNS | =0.58 | |
NLnet Labs NetDNS | =0.44 | |
NLnet Labs NetDNS | =0.40 | |
NLnet Labs NetDNS | =0.51_01 | |
NLnet Labs NetDNS | =0.25 | |
NLnet Labs NetDNS | =0.50 | |
NLnet Labs NetDNS | =0.47_01 | |
NLnet Labs NetDNS | =0.21 | |
NLnet Labs NetDNS | =0.28 | |
NLnet Labs NetDNS | =0.31 | |
NLnet Labs NetDNS | =0.51_02 | |
NLnet Labs NetDNS | =0.43 | |
NLnet Labs NetDNS | =0.32 | |
NLnet Labs NetDNS | =0.20 | |
NLnet Labs NetDNS | =0.34 | |
NLnet Labs NetDNS | =0.52 | |
NLnet Labs NetDNS | =0.30 | |
NLnet Labs NetDNS | =0.44_01 | |
NLnet Labs NetDNS | =0.53_01 | |
NLnet Labs NetDNS | =0.48_02 | |
NLnet Labs NetDNS | =0.34_03 | |
NLnet Labs NetDNS | =0.55 | |
NLnet Labs NetDNS | =0.57 | |
NLnet Labs NetDNS | =0.22 | |
NLnet Labs NetDNS | =0.39_02 | |
NLnet Labs NetDNS | =0.49_02 | |
NLnet Labs NetDNS | =0.38_01 | |
NLnet Labs NetDNS | =0.45 | |
NLnet Labs NetDNS | =0.26 | |
NLnet Labs NetDNS | =0.44_02 | |
NLnet Labs NetDNS | =0.40_01 | |
NLnet Labs NetDNS | =0.39_01 | |
NLnet Labs NetDNS | =0.27 | |
NLnet Labs NetDNS | =0.49_01 | |
NLnet Labs NetDNS | =0.56 | |
NLnet Labs NetDNS | =0.53_02 | |
NLnet Labs NetDNS | =0.36 | |
NLnet Labs NetDNS | =0.42_01 | |
NLnet Labs NetDNS | =0.54 | |
NLnet Labs NetDNS | =0.39 | |
NLnet Labs NetDNS | =0.48 | |
NLnet Labs NetDNS | =0.53 | |
Net::DNS | <0.60 | |
Debian | =3.1 | |
Debian | =4.0 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-3409 is classified as medium, as it can lead to a denial of service due to stack consumption.
To fix CVE-2007-3409, upgrade the Net::DNS Perl module to version 0.60 or later.
CVE-2007-3409 affects Net::DNS versions before 0.60, including versions like 0.48_03, 0.59, and earlier.
CVE-2007-3409 allows remote attackers to exploit a malformed DNS packet to cause a denial of service.
CVE-2007-3409 can affect systems running vulnerable versions of Net::DNS on any operating system that supports Perl.