Bug 426437 (CVE-2007-6341) - CVE-2007-6341 Perl crash by crafted response to Net::DNS
Summary: CVE-2007-6341 Perl crash by crafted response to Net::DNS
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2007-6341
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-12-20 23:41 UTC by Lubomir Kundrak
Modified: 2021-11-12 19:47 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-03-19 10:44:55 UTC
Embargoed:


Attachments (Terms of Use)

Description Lubomir Kundrak 2007-12-20 23:41:44 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6341 to the following vulnerability:

Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such
as SpamAssassin and OTRS, allows remote attackers to cause a denial of
service (program "croak") via a crafted DNS response.

References:

http://www.securiteam.com/unixfocus/6I00E0UKKQ.html
https://rt.cpan.org/Public/Bug/Display.html?id=30316

Comment 1 Josh Bressers 2008-01-08 02:12:38 UTC
This issue has no security impact.  The flaw will cause Net::DNS to "croak",
which in turn should be handled by the calling application.  In the case of
RHEL, the only known application that uses this functionality is Spamassassin. 
Spamassassin handles this failure gracefully and continues to function, minus
the DNS tests.

Comment 2 Dick Franks 2008-02-13 18:10:28 UTC
This and similar vulnerabilities fixed in Net::DNS version 0.63.

Comment 3 Marcela Mašláňová 2008-03-19 09:10:17 UTC
Net::DNS version 0.63 is in rawhide.


Note You need to log in before you can comment on or make changes to this bug.