Vulnerability Details : CVE-2007-3409
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
Vulnerability category: Denial of service
Products affected by CVE-2007-3409
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
- cpe:2.3:a:net-dns:net\:\:dns:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3409
12.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3409
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | 2024-02-03 |
CWE ids for CVE-2007-3409
-
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-3409
-
http://secunia.com/advisories/26014
About Secunia Research | FlexeraBroken Link
-
http://www.securityfocus.com/archive/1/473871/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
-
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
Broken Link
-
http://secunia.com/advisories/29354
About Secunia Research | FlexeraBroken Link
-
http://www.securityfocus.com/bid/24669
Broken Link;Third Party Advisory;VDB Entry
-
http://www.trustix.org/errata/2007/0023/
Trustix | Empowering Trust and Security in the Digital AgeBroken Link
-
http://secunia.com/advisories/26055
About Secunia Research | FlexeraBroken Link
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:146
Advisories - Mandriva LinuxThird Party Advisory
-
http://secunia.com/advisories/26211
About Secunia Research | FlexeraBroken Link
-
http://www.redhat.com/support/errata/RHSA-2007-0674.html
SupportBroken Link
-
http://rt.cpan.org/Public/Bug/Display.html?id=27285
Human VerificationBroken Link
-
http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml
Net::DNS: Multiple vulnerabilities (GLSA 200708-06) — Gentoo securityThird Party Advisory
-
http://osvdb.org/37054
Broken Link
-
http://secunia.com/advisories/26543
About Secunia Research | FlexeraBroken Link
-
http://secunia.com/advisories/25829
About Secunia Research | FlexeraBroken Link
-
http://secunia.com/advisories/26231
About Secunia Research | FlexeraBroken Link
-
http://www.debian.org/security/2008/dsa-1515
[SECURITY] [DSA 1515-1] New libnet-dns-perl packages fix several vulnerabilitiesMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/usn-483-1
USN-483-1: libnet-dns-perl vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595
404 Not FoundBroken Link
-
http://secunia.com/advisories/26075
About Secunia Research | FlexeraBroken Link
-
http://secunia.com/advisories/26417
About Secunia Research | FlexeraBroken Link
-
http://secunia.com/advisories/26012
About Secunia Research | FlexeraBroken Link
-
http://www.securitytracker.com/id?1018376
Broken Link;Third Party Advisory;VDB Entry
-
http://www.net-dns.org/docs/Changes.html
Net::DNSRelease Notes
-
http://www.novell.com/linux/security/advisories/2007_17_sr.html
404 Page Not Found | SUSEBroken Link
Jump to