3 results (0.005 seconds)

CVSS: 5.0EPSS: 8%CPEs: 1EXPL: 4

Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such as SpamAssassin and OTRS, allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response. Net/DNS/RR/A.pm en Net::DNS 0.60 construcción 654, utilizado en paquetes como SpamAssassin y OTRS, permite a atacantes remotos provocar denegación de servicio (programa muere(croak)) a través de una respuesta DNS. • https://www.exploit-db.com/exploits/30895 http://search.cpan.org/src/OLAF/Net-DNS-0.63/Changes http://secunia.com/advisories/29343 http://secunia.com/advisories/29354 http://secunia.com/advisories/29446 http://secunia.com/advisories/29555 http://www.debian.org/security/2008/dsa-1515 http://www.mandriva.com/security/advisories?name=MDVSA-2008:073 http://www.securiteam.com/unixfocus/6I00E0UKKQ.html http://www.securityfocus.com/bid/26902 http://www.securitytracker.com/id&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 12%CPEs: 5EXPL: 0

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop. Net::DNS anterior a 0.60, un módulo de Perl, permite a atacantes remotos provocar una denegación de servicio (consumo de pila) mediante un paquete DNS comprimido y mal formado con punteros que hacen referencia a si mismos, lo cual provoca un bucle infinito. • ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc http://osvdb.org/37054 http://rt.cpan.org/Public/Bug/Display.html?id=27285 http://secunia.com/advisories/25829 http://secunia.com/advisories/26012 http://secunia.com/advisories/26014 http://secunia.com/advisories/26055 http://secunia.com/advisories/26075 http://secunia.com/advisories/26211 http://secunia.com/advisories/26231 http://secunia.com/advisories/26417 http://secunia.com/advisories/26543&# • CWE-674: Uncontrolled Recursion •

CVSS: 7.5EPSS: 15%CPEs: 1EXPL: 3

PHP remote file inclusion vulnerability in DNS/RR.php in Net_DNS 0.03 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the phpdns_basedir parameter. Vulnerabilidad de inclusión remota de archivo en PHP en DNS/RR.php de Net_DNS 0.03 y anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro phpdns_basedir. • https://www.exploit-db.com/exploits/2614 http://secunia.com/advisories/22522 http://www.securityfocus.com/bid/20666 http://www.vupen.com/english/advisories/2006/4185 https://exchange.xforce.ibmcloud.com/vulnerabilities/29698 https://www.exploit-db.com/exploits/4755 •