CVE-2007-3377 Affecting libnet-dns-perl package, versions <0.60-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
1.98% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-LIBNETDNSPERL-528739
  • published25 Jun 2007
  • disclosed25 Jun 2007

Introduced: 25 Jun 2007

CVE-2007-3377  (opens in a new tab)

How to fix?

Upgrade Debian:11 libnet-dns-perl to version 0.60-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libnet-dns-perl package and not the libnet-dns-perl package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

References

CVSS Base Scores

version 3.1