// For flags

CVE-2007-6341

Perl Net::DNS 0.48/0.59/0.60 - DNS Response Remote Denial of Service

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

4
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Net/DNS/RR/A.pm in Net::DNS 0.60 build 654, as used in packages such as SpamAssassin and OTRS, allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

Net/DNS/RR/A.pm en Net::DNS 0.60 construcción 654, utilizado en paquetes como SpamAssassin y OTRS, permite a atacantes remotos provocar denegación de servicio (programa muere(croak)) a través de una respuesta DNS.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-12-13 CVE Reserved
  • 2007-12-17 First Exploit
  • 2007-12-20 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Net Dns
Search vendor "Net Dns"
Net Dns
Search vendor "Net Dns" for product "Net Dns"
0.60
Search vendor "Net Dns" for product "Net Dns" and version "0.60"
build_654
Affected