CVE-2007-3377 (CNNVD-200706-406)

MEDIUM
中文标题:
Net::DNS Header.pm可预测ID序列漏洞
英文标题:
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixe...
CVSS分数: 4.3
发布时间: 2007-06-25 21:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Net::DNS是用Perl实现的DNS解析器。 Net::DNS实现上存在漏洞,远程攻击者可能利用此漏洞导致DNS服务器被欺骗或拒绝服务。 在Net::DNS中ID序列是在header.pm中确定的: { my $id = int rand(MAX_ID); sub nextid { return $id++ % (MAX_ID + 1); } } 如果使用了这个模块的话就会设置$id,然后仅是简单的递增,这可能导致两个后果: 1) 序列号可预测,简化了DNS欺骗攻击; 2) 如果在fork服务器中使用Net::DNS的话,则通常会在父进程使用。除非父进程在接受请求之间进行DNS查询,否则每个子进程都会以相同的$id值开始并经历相同的id序列。由于源端口也可能是固定的,因此一个子进程很可能接受之前子进程所发送查询的回复。

英文描述:

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
nlnet_labs net_dns 0.14 - - cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*
nlnet_labs net_dns 0.20 - - cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*
nlnet_labs net_dns 0.21 - - cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*
nlnet_labs net_dns 0.22 - - cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*
nlnet_labs net_dns 0.23 - - cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*
nlnet_labs net_dns 0.24 - - cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*
nlnet_labs net_dns 0.25 - - cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*
nlnet_labs net_dns 0.26 - - cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*
nlnet_labs net_dns 0.27 - - cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*
nlnet_labs net_dns 0.28 - - cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*
nlnet_labs net_dns 0.29 - - cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*
nlnet_labs net_dns 0.30 - - cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*
nlnet_labs net_dns 0.31 - - cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*
nlnet_labs net_dns 0.32 - - cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*
nlnet_labs net_dns 0.33 - - cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*
nlnet_labs net_dns 0.34 - - cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*
nlnet_labs net_dns 0.34_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.34_03 - - cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*
nlnet_labs net_dns 0.35 - - cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*
nlnet_labs net_dns 0.36 - - cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*
nlnet_labs net_dns 0.37 - - cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*
nlnet_labs net_dns 0.38 - - cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*
nlnet_labs net_dns 0.38_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.38_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.39 - - cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*
nlnet_labs net_dns 0.39_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.39_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.40 - - cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*
nlnet_labs net_dns 0.40_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.41 - - cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*
nlnet_labs net_dns 0.42 - - cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*
nlnet_labs net_dns 0.42_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.42_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.43 - - cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*
nlnet_labs net_dns 0.44 - - cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*
nlnet_labs net_dns 0.44_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.44_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.45 - - cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*
nlnet_labs net_dns 0.45_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.46 - - cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*
nlnet_labs net_dns 0.47 - - cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*
nlnet_labs net_dns 0.47_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.48 - - cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*
nlnet_labs net_dns 0.48_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.48_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.48_03 - - cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*
nlnet_labs net_dns 0.49 - - cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*
nlnet_labs net_dns 0.49_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.49_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.49_03 - - cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*
nlnet_labs net_dns 0.50 - - cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*
nlnet_labs net_dns 0.51 - - cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*
nlnet_labs net_dns 0.51_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.51_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.52 - - cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*
nlnet_labs net_dns 0.53 - - cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*
nlnet_labs net_dns 0.53_01 - - cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*
nlnet_labs net_dns 0.53_02 - - cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*
nlnet_labs net_dns 0.54 - - cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*
nlnet_labs net_dns 0.55 - - cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*
nlnet_labs net_dns 0.56 - - cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*
nlnet_labs net_dns 0.57 - - cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*
nlnet_labs net_dns 0.58 - - cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*
nlnet_labs net_dns 0.59 - - cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
26231 third-party-advisory
cve.org
访问
26417 third-party-advisory
cve.org
访问
29354 third-party-advisory
cve.org
访问
26014 third-party-advisory
cve.org
访问
RHSA-2007:0675 vendor-advisory
cve.org
访问
oval:org.mitre.oval:def:9904 vdb-entry
cve.org
访问
26012 third-party-advisory
cve.org
访问
DSA-1515 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SUSE-SR:2007:017 vendor-advisory
cve.org
访问
26543 third-party-advisory
cve.org
访问
netdns-dns-responses-spoofing(35112) vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
USN-483-1 vendor-advisory
cve.org
访问
2007-0023 vendor-advisory
cve.org
访问
MDKSA-2007:146 vendor-advisory
cve.org
访问
RHSA-2007:0674 vendor-advisory
cve.org
访问
26055 third-party-advisory
cve.org
访问
26211 third-party-advisory
cve.org
访问
37053 vdb-entry
cve.org
访问
26075 third-party-advisory
cve.org
访问
1018377 vdb-entry
cve.org
访问
26508 third-party-advisory
cve.org
访问
24669 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20070701-01-P vendor-advisory
cve.org
访问
25829 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
GLSA-200708-06 vendor-advisory
cve.org
访问
20070717 rPSA-2007-0142-1 perl-Net-DNS mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
4.3
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本: 2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2007-06-25 21:00:00
修改时间:
2024-08-07 14:14:12
创建时间:
2025-11-11 15:32:44
更新时间:
2025-11-11 15:49:18
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-3377 2025-11-11 15:17:53 2025-11-11 07:32:44
NVD nvd_CVE-2007-3377 2025-11-11 14:52:11 2025-11-11 07:41:31
CNNVD cnnvd_CNNVD-200706-406 2025-11-11 15:08:57 2025-11-11 07:49:18
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:18
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200706-406; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200706-406
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:31
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 64; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 64
  • data_sources: ['cve'] -> ['cve', 'nvd']