CVE-2007-6341
Severity:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
20/12/2007
Last modified:
03/10/2018
Description
Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such as SpamAssassin and OTRS, allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:net_dns:net_dns:0.60:build_654:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes
- http://secunia.com/advisories/29343
- http://secunia.com/advisories/29354
- http://secunia.com/advisories/29446
- http://secunia.com/advisories/29555
- http://www.debian.org/security/2008/dsa-1515
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A073
- http://www.securiteam.com/unixfocus/6I00E0UKKQ.html
- http://www.securityfocus.com/bid/26902
- http://www.securitytracker.com/id?1019104=
- https://rt.cpan.org/Public/Bug/Display.html?id=30316
- https://usn.ubuntu.com/594-1/