Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such as SpamAssassin and OTRS, allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.
References
Configurations
History
21 Nov 2024, 00:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes - | |
References | () http://secunia.com/advisories/29343 - | |
References | () http://secunia.com/advisories/29354 - | |
References | () http://secunia.com/advisories/29446 - | |
References | () http://secunia.com/advisories/29555 - | |
References | () http://www.debian.org/security/2008/dsa-1515 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2008:073 - | |
References | () http://www.securiteam.com/unixfocus/6I00E0UKKQ.html - Exploit | |
References | () http://www.securityfocus.com/bid/26902 - Exploit | |
References | () http://www.securitytracker.com/id?1019104 - | |
References | () https://rt.cpan.org/Public/Bug/Display.html?id=30316 - Exploit | |
References | () https://usn.ubuntu.com/594-1/ - |
Information
Published : 2007-12-20 23:46
Updated : 2025-04-09 00:30
NVD link : CVE-2007-6341
Mitre link : CVE-2007-6341
CVE.ORG link : CVE-2007-6341
JSON object : View
Products Affected
net_dns
- net_dns
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer