CVE-2007-3377

Publication date 25 June 2007

Last updated 24 July 2024


Ubuntu priority

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

Status

Package Ubuntu Release Status
libnet-dns-perl 7.10 gutsy
Not affected
7.04 feisty
Fixed 0.59-1build1.1
6.10 edgy
Fixed 0.57-1ubuntu1
6.06 LTS dapper
Fixed 0.53-2ubuntu1

References

Related Ubuntu Security Notices (USN)

    • USN-483-1
    • libnet-dns-perl vulnerabilities
    • 13 July 2007

Other references