Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

Net::DNS::RR - DNS Resource Record class

SYNOPSIS

use Net::DNS::RR

DESCRIPTION

Net::DNS::RR is the base class for DNS Resource Record (RR) objects. See also the manual pages for each RR type.

METHODS

print

$rrobj->print;

Prints the record to the standard output. Calls the string method to get the RR's string representation.

string

print $rrobj->string, "\n";

Returns a string representation of the RR. Calls the rdatastr method to get the RR-specific data.

rdatastr

$s = $rrobj->rdatastr;

Returns a string containing RR-specific data. Subclasses will need to implement this method.

name

$name = $rrobj->name;

Returns the record's domain name.

type

$type = $rrobj->type;

Returns the record's type.

class

$class = $rrobj->class;

Returns the record's class.

ttl

$ttl = $rrobj->ttl;

Returns the record's time-to-live (TTL).

COPYRIGHT

Copyright (c) 1997 Michael Fuhr. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

SEE ALSO

perl(1), Net::DNS, Net::DNS::Resolver, Net::DNS::Packet, Net::DNS::Header, Net::DNS::Question, RFC 1035 Section 4.1.3