Security Advisories (3)
Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
- http://rt.cpan.org/Public/Bug/Display.html?id=27285
- http://www.net-dns.org/docs/Changes.html
- http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:146
- http://www.redhat.com/support/errata/RHSA-2007-0674.html
- ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
- http://www.novell.com/linux/security/advisories/2007_17_sr.html
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-483-1
- http://www.securityfocus.com/bid/24669
- http://www.securitytracker.com/id?1018376
- http://secunia.com/advisories/25829
- http://secunia.com/advisories/26014
- http://secunia.com/advisories/26055
- http://secunia.com/advisories/26012
- http://secunia.com/advisories/26075
- http://secunia.com/advisories/26211
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26417
- http://secunia.com/advisories/26543
- http://www.debian.org/security/2008/dsa-1515
- http://secunia.com/advisories/29354
- http://osvdb.org/37054
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595
- http://www.securityfocus.com/archive/1/473871/100/0/threaded
Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
- http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html
- http://rt.cpan.org/Public/Bug/Display.html?id=23961
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458
- http://www.net-dns.org/docs/Changes.html
- http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm
- http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:146
- http://www.redhat.com/support/errata/RHSA-2007-0674.html
- http://www.redhat.com/support/errata/RHSA-2007-0675.html
- ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
- http://www.novell.com/linux/security/advisories/2007_17_sr.html
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-483-1
- http://www.securityfocus.com/bid/24669
- http://www.securitytracker.com/id?1018377
- http://secunia.com/advisories/25829
- http://secunia.com/advisories/26014
- http://secunia.com/advisories/26055
- http://secunia.com/advisories/26012
- http://secunia.com/advisories/26075
- http://secunia.com/advisories/26211
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26417
- http://secunia.com/advisories/26508
- http://secunia.com/advisories/26543
- http://www.debian.org/security/2008/dsa-1515
- http://secunia.com/advisories/29354
- http://osvdb.org/37053
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35112
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904
- http://www.securityfocus.com/archive/1/473871/100/0/threaded
NAME
check_soa - Check a domain's nameservers
SYNOPSIS
check_soa domain
DESCRIPTION
check_soa queries each of a domain's nameservers for the Start of Authority (SOA) record and prints the serial number. Errors are printed for nameservers that couldn't be reached or didn't answer authoritatively.
AUTHOR
The original Bourne Shell and C versions were printed in DNS and BIND by Paul Albitz & Cricket Liu.
This Perl version was written by Michael Fuhr <mike@fuhr.org>.
SEE ALSO
Module Install Instructions
To install Net::DNS, copy and paste the appropriate command in to your terminal.
cpanm Net::DNS
perl -MCPAN -e shell
install Net::DNS
For more information on module installation, please visit the detailed CPAN module installation guide.