FreeBSD : p5-Net-DNS -- multiple Vulnerabilities (d2b8a963-3d59-11dc-b3d3-0016179b2dd5)

medium Nessus Plugin ID 25807

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

A Secunia Advisory reports :

An error exists in the handling of DNS queries where IDs are incremented with a fixed value and are additionally used for child processes in a forking server. This can be exploited to poison the DNS cache of an application using the module if a valid ID is guessed.

An error in the PP implementation within the 'dn_expand()' function can be exploited to cause a stack overflow due to an endless loop via a specially crafted DNS packet.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?76cad435

Plugin Details

Severity: Medium

ID: 25807

File Name: freebsd_pkg_d2b8a9633d5911dcb3d30016179b2dd5.nasl

Version: 1.17

Type: local

Published: 7/30/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:p5-net-dns, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/28/2007

Vulnerability Publication Date: 6/27/2007

Reference Information

CVE: CVE-2007-3377, CVE-2007-3409

Secunia: 25829