DescriptionHeader.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SR:2007:017, published Fri, 17 Aug 2007 17:00:00 +0000
SUSE Timeline for this CVECVE page created: Tue Jul 9 15:32:24 2013
CVE page last modified: Fri Oct 7 12:45:37 2022