Executive Summary
Summary | |
---|---|
Title | New libnet-dns-perl packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1515 | First vendor Publication | 2008-03-11 |
Vendor | Debian | Last vendor Modification | 2008-03-11 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several remote vulnerabilities have been discovered in libnet-dns-perl. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that libnet-dns-perl generates very weak transaction IDs when sending queries (CVE-2007-3377). This update switches transaction ID generation to the Perl random generator, making prediction attacks more difficult. Compression loops in domain names resulted in an infinite loop in the domain name expander written in Perl (CVE-2007-3409). The Debian package uses an expander written in C by default, but this vulnerability has been addressed nevertheless. Decoding malformed A records could lead to a crash (via an uncaught Perl exception) of certain applications using libnet-dns-perl (CVE-2007-6341). For the stable distribution (etch), these problems have been fixed in version 0.59-1etch1. For the old stable distribution (sarge), these problems have been fixed in version 0.48-1sarge1. We recommend that you upgrade your libnet-dns-perl package. |
Original Source
Url : http://www.debian.org/security/2008/dsa-1515 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-7 | Blind SQL Injection |
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-22 | Exploiting Trust in Client (aka Make the Client Invisible) |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-28 | Fuzzing |
CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-42 | MIME Conversion |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-52 | Embedding NULL Bytes |
CAPEC-53 | Postfix, Null Terminate, and Backslash |
CAPEC-63 | Simple Script Injection |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-66 | SQL Injection |
CAPEC-67 | String Format Overflow in syslog() |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
CAPEC-72 | URL Encoding |
CAPEC-73 | User-Controlled Filename |
CAPEC-78 | Using Escaped Slashes in Alternate Encoding |
CAPEC-79 | Using Slashes in Alternate Encoding |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-81 | Web Logs Tampering |
CAPEC-82 | Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi... |
CAPEC-83 | XPath Injection |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CAPEC-88 | OS Command Injection |
CAPEC-91 | XSS in IMG Tags |
CAPEC-99 | XML Parser Attack |
CAPEC-101 | Server Side Include (SSI) Injection |
CAPEC-104 | Cross Zone Scripting |
CAPEC-106 | Cross Site Scripting through Log Files |
CAPEC-108 | Command Line Execution through SQL Injection |
CAPEC-109 | Object Relational Mapping Injection |
CAPEC-110 | SQL Injection through SOAP Parameter Tampering |
CAPEC-171 | Variable Manipulation |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-674 | Uncontrolled Recursion |
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10595 | |||
Oval ID: | oval:org.mitre.oval:def:10595 | ||
Title: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Description: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3409 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17761 | |||
Oval ID: | oval:org.mitre.oval:def:17761 | ||
Title: | USN-594-1 -- libnet-dns-perl vulnerability | ||
Description: | It was discovered that Net::DNS did not correctly validate the size of DNS replies. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-594-1 CVE-2007-6341 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 | Product(s): | libnet-dns-perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20002 | |||
Oval ID: | oval:org.mitre.oval:def:20002 | ||
Title: | DSA-1515-1 libnet-dns-perl - several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in libnet-dns-perl. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1515-1 CVE-2007-3377 CVE-2007-3409 CVE-2007-6341 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | libnet-dns-perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22552 | |||
Oval ID: | oval:org.mitre.oval:def:22552 | ||
Title: | ELSA-2007:0674: perl-Net-DNS security update (Moderate) | ||
Description: | Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0674-01 CVE-2007-3377 CVE-2007-3409 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | perl-Net-DNS |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8232 | |||
Oval ID: | oval:org.mitre.oval:def:8232 | ||
Title: | DSA-1515 libnet-dns-perl -- several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in libnet-dns-perl. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that libnet-dns-perl generates very weak transaction IDs when sending queries (CVE-2007-3377). This update switches transaction ID generation to the Perl random generator, making prediction attacks more difficult. Compression loops in domain names resulted in an infinite loop in the domain name expander written in Perl (CVE-2007-3409). The Debian package uses an expander written in C by default, but this vulnerability has been addressed nevertheless. Decoding malformed A records could lead to a crash (via an uncaught Perl exception) of certain applications using libnet-dns-perl (CVE-2007-6341). | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1515 CVE-2007-3377 CVE-2007-3409 CVE-2007-6341 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 Debian GNU/Linux 3.1 | Product(s): | libnet-dns-perl |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9904 | |||
Oval ID: | oval:org.mitre.oval:def:9904 | ||
Title: | Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | ||
Description: | Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-3377 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-13 | Name : SLES10: Security update for perl-Net-DNS File : nvt/sles10_perl-Net-DNS.nasl |
2009-10-10 | Name : SLES9: Security update for perl-Net-DNS File : nvt/sles9p5016730.nasl |
2009-04-09 | Name : Mandriva Update for perl-Net-DNS MDKSA-2007:146 (perl-Net-DNS) File : nvt/gb_mandriva_MDKSA_2007_146.nasl |
2009-04-09 | Name : Mandriva Update for perl-Net-DNS MDVSA-2008:073 (perl-Net-DNS) File : nvt/gb_mandriva_MDVSA_2008_073.nasl |
2009-03-23 | Name : Ubuntu Update for libnet-dns-perl vulnerabilities USN-483-1 File : nvt/gb_ubuntu_USN_483_1.nasl |
2009-03-23 | Name : Ubuntu Update for libnet-dns-perl vulnerability USN-594-1 File : nvt/gb_ubuntu_USN_594_1.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200708-06 (net-dns) File : nvt/glsa_200708_06.nasl |
2008-09-04 | Name : FreeBSD Ports: p5-Net-DNS File : nvt/freebsd_p5-Net-DNS.nasl |
2008-03-19 | Name : Debian Security Advisory DSA 1515-1 (libnet-dns-perl) File : nvt/deb_1515_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
43106 | Perl Net::DNS Module Net/DNS/RR/A.pm Malformed DNS Response DoS Perl Net::DNS Module contains a flaw that may allow a remote denial of service. The issue is triggered when a remote malicious attacker sends malformed DNS response, and will result in loss of availability for the service. |
37054 | Perl Net::DNS Malformed Compressed DNS Packet Remote DoS |
37053 | Perl Net::DNS Header.pm Sequence ID Generation Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20070712_perl_Net_DNS_on_SL3_0_x.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11702.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2008-073.nasl - Type : ACT_GATHER_INFO |
2008-03-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-594-1.nasl - Type : ACT_GATHER_INFO |
2008-03-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1515.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_perl-Net-DNS-4046.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-483-1.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_perl-Net-DNS-3961.nasl - Type : ACT_GATHER_INFO |
2007-08-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200708-06.nasl - Type : ACT_GATHER_INFO |
2007-07-30 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_d2b8a9633d5911dcb3d30016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2007-146.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0675.nasl - Type : ACT_GATHER_INFO |
2007-07-18 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2007-0674.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:25 |
|