Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

axfr - Perform a DNS zone transfer

SYNOPSIS

axfr [ -fqs ] [ -D directory ] [ @nameserver ] zone

DESCRIPTION

axfr performs a DNS zone transfer, prints each record to the standard output, and stores the zone to a file. If the zone has already been stored in a file, axfr will read the file instead of performing a zone transfer.

Zones will be stored in a directory hierarchy. For example, the zone transfer for foo.bar.com will be stored in the file $HOME/.dns-zones/com/bar/foo/axfr. The directory can be changed with the -D option.

This programs requires that the Storable module be installed.

OPTIONS

-f

Force a zone transfer, even if the zone has already been stored in a file.

-q

Be quiet -- don't print the records from the zone.

-s

Perform a zone transfer if the SOA serial number on the nameserver is different than the serial number in the zone file.

-D directory

Store zone files under directory instead of the default directory (see "FILES").

@nameserver

Query nameserver instead of the default nameserver.

FILES

$HOME/.dns-zones

Default directory for storing zone files.

AUTHOR

Michael Fuhr <mike@fuhr.org>

SEE ALSO

perl(1), check_soa, check_zone, mresolv, mx, perldig, Net::DNS, Storable