Unrated severityNVD Advisory· Published Jun 25, 2007· Updated Apr 23, 2026
CVE-2007-3377
CVE-2007-3377
Description
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
Affected products
64cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*+ 63 more
- cpe:2.3:a:nlnet_labs:net_dns:0.14:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.20:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.21:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.22:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.23:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.24:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.25:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.26:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.27:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.28:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.29:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.30:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.31:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.32:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.33:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.34:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.34_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.34_03:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.35:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.36:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.37:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.38:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.38_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.38_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.39:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.39_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.39_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.40:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.40_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.41:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.42:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.42_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.42_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.43:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.44:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.44_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.44_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.45:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.45_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.46:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.47:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.47_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.48:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.48_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.48_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.48_03:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.49:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.49_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.49_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.49_03:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.50:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.51_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.51_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.53:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.53_01:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.53_02:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.54:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.55:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.56:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.57:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.58:*:*:*:*:*:*:*
- cpe:2.3:a:nlnet_labs:net_dns:0.59:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- bugzilla.redhat.com/bugzilla/show_bug.cginvdPatch
- www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.htmlnvdExploit
- patches.sgi.com/support/free/security/advisories/20070701-01-P.ascnvd
- osvdb.org/37053nvd
- rt.cpan.org/Public/Bug/Display.htmlnvd
- secunia.com/advisories/25829nvd
- secunia.com/advisories/26012nvd
- secunia.com/advisories/26014nvd
- secunia.com/advisories/26055nvd
- secunia.com/advisories/26075nvd
- secunia.com/advisories/26211nvd
- secunia.com/advisories/26231nvd
- secunia.com/advisories/26417nvd
- secunia.com/advisories/26508nvd
- secunia.com/advisories/26543nvd
- secunia.com/advisories/29354nvd
- support.avaya.com/elmodocs2/security/ASA-2007-351.htmnvd
- www.debian.org/security/2008/dsa-1515nvd
- www.gentoo.org/security/en/glsa/glsa-200708-06.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.net-dns.org/docs/Changes.htmlnvd
- www.novell.com/linux/security/advisories/2007_17_sr.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0674.htmlnvd
- www.redhat.com/support/errata/RHSA-2007-0675.htmlnvd
- www.securityfocus.com/archive/1/473871/100/0/threadednvd
- www.securityfocus.com/bid/24669nvd
- www.securitytracker.com/idnvd
- www.trustix.org/errata/2007/0023/nvd
- www.ubuntu.com/usn/usn-483-1nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/35112nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904nvd
News mentions
0No linked articles in our index yet.