Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

Net::DNS::FAQ - Frequently Asked Net::DNS Questions

SYNOPSIS

perldoc Net::DNS::FAQ

DESCRIPTION

This document serves to answer the most frequently asked questions on both the Net::DNS Mailing List and those sent to the author.

The latest version of this FAQ can be found at http://www.net-dns.org/docs/FAQ.html

GENERAL

What is Net::DNS?

Net::DNS is a perl implementation of a DNS resolver.

INSTALLATION

Where can I find Test::More?

Test::More is part of the Test-Simple packge, by Michael G Schwern. You should be able to find the distrubution here:

http://search.cpan.org/dist/Test-Simple/

USAGE

Why does Net::DNS::Resolver::query() return undef when the ANSWER section is empty?

The short answer is, don't use query(). Net::DNS::Resolver::send() will always return the answer packet, as long as an answer was received.

The longer answer is that query() is modeled after the res_query() function from the libresolv C library, which has similar behaviors.

VERSION

$Id: FAQ.pod 264 2005-04-06 09:16:15Z olaf $