Executive Summary
Summary | |
---|---|
Title | libnet-dns-perl vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-483-1 | First vendor Publication | 2007-07-11 |
Vendor | Ubuntu | Last vendor Modification | 2007-07-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 6.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: Ubuntu 6.10: After a standard system upgrade you need to reboot your computer to effect the necessary changes. Details follow: Peter Johannes Holzer discovered that the Net::DNS Perl module had predictable sequence numbers. This could allow remote attackers to carry out DNS spoofing, leading to possible man-in-the-middle attacks. (CVE-2007-3377) Steffen Ullrich discovered that the Net::DNS Perl module did not correctly detect recursive compressed responses. A remote attacker could send a specially crafted packet, causing applications using Net::DNS to crash or monopolize CPU resources, leading to a denial of service. (CVE-2007-3409) |
Original Source
Url : http://www.ubuntu.com/usn/USN-483-1 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-28 | Fuzzing |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
CAPEC-67 | String Format Overflow in syslog() |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
CAPEC-72 | URL Encoding |
CAPEC-73 | User-Controlled Filename |
CAPEC-78 | Using Escaped Slashes in Alternate Encoding |
CAPEC-79 | Using Slashes in Alternate Encoding |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-81 | Web Logs Tampering |
CAPEC-82 | Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi... |
CAPEC-83 | XPath Injection |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CAPEC-88 | OS Command Injection |
CAPEC-91 | XSS in IMG Tags |
CAPEC-99 | XML Parser Attack |
CAPEC-101 | Server Side Include (SSI) Injection |
CAPEC-104 | Cross Zone Scripting |
CAPEC-106 | Cross Site Scripting through Log Files |
CAPEC-108 | Command Line Execution through SQL Injection |
CAPEC-109 | Object Relational Mapping Injection |
CAPEC-110 | SQL Injection through SOAP Parameter Tampering |
CAPEC-171 | Variable Manipulation |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-674 | Uncontrolled Recursion |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10595 | |||
Oval ID: | oval:org.mitre.oval:def:10595 | ||
Title: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Description: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3409 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22552 | |||
Oval ID: | oval:org.mitre.oval:def:22552 | ||
Title: | ELSA-2007:0674: perl-Net-DNS security update (Moderate) | ||
Description: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0674-01 CVE-2007-3377 CVE-2007-3409 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | perl-Net-DNS |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9904 | |||
Oval ID: | oval:org.mitre.oval:def:9904 | ||
Title: | Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | ||
Description: | Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3377 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-13 | Name : SLES10: Security update for perl-Net-DNS File : nvt/sles10_perl-Net-DNS.nasl |
2009-10-10 | Name : SLES9: Security update for perl-Net-DNS File : nvt/sles9p5016730.nasl |
2009-04-09 | Name : Mandriva Update for perl-Net-DNS MDKSA-2007:146 (perl-Net-DNS) File : nvt/gb_mandriva_MDKSA_2007_146.nasl |
2009-03-23 | Name : Ubuntu Update for libnet-dns-perl vulnerabilities USN-483-1 File : nvt/gb_ubuntu_USN_483_1.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200708-06 (net-dns) File : nvt/glsa_200708_06.nasl |
2008-09-04 | Name : FreeBSD Ports: p5-Net-DNS File : nvt/freebsd_p5-Net-DNS.nasl |
2008-03-19 | Name : Debian Security Advisory DSA 1515-1 (libnet-dns-perl) File : nvt/deb_1515_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37054 | Perl Net::DNS Malformed Compressed DNS Packet Remote DoS |
37053 | Perl Net::DNS Header.pm Sequence ID Generation Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20070712_perl_Net_DNS_on_SL3_0_x.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11702.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1515.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-Net-DNS-4046.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-483-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_perl-Net-DNS-3961.nasl - Type : ACT_GATHER_INFO |
2007-08-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200708-06.nasl - Type : ACT_GATHER_INFO |
2007-07-30 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_d2b8a9633d5911dcb3d30016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2007-146.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-07-29 12:07:33 |
|
2016-07-21 12:10:03 |
|
2014-02-17 12:04:28 |
|
2013-05-11 12:25:56 |
|