|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-594-1 (libnet-dns-perl)|
|Summary:||Ubuntu USN-594-1 (libnet-dns-perl)|
The remote host is missing an update to libnet-dns-perl
announced via advisory USN-594-1.
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
It was discovered that Net::DNS did not correctly validate the size
of DNS replies. A remote attacker could send a specially crafted DNS
response and cause applications using Net::DNS to abort, leading to a
denial of service.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
In general, a standard system upgrade is sufficient to effect the
Risk factor : Medium
Common Vulnerability Exposure (CVE) ID: CVE-2007-6341|
Debian Security Information: DSA-1515 (Google Search)
BugTraq ID: 26902
|Copyright||Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com|
|This is only one of 43500 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.