Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

check_zone - Check a DNS zone for errors

SYNOPSIS

check_zone [ -r ] domain [ class ]

DESCRIPTION

Checks a DNS zone for errors. Current checks are:

  • Checks that all A records have corresponding PTR records.

  • Checks that hosts listed in NS, MX, and CNAME records have A records.

OPTIONS

-r

Perform a recursive check on subdomains.

AUTHOR

Michael Fuhr <mike@fuhr.org>

SEE ALSO

perl(1), axfr, check_soa, mresolv, mx, perldig, Net::DNS