Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1841

Опубликовано: 13 июн. 2014
Источник: debian
EPSS Низкий

Описание

Net-Server, when the reverse-lookups option is enabled, does not check if the hostname resolves to the source IP address, which might allow remote attackers to bypass ACL restrictions via the hostname parameter.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libnet-server-perlfixed2.013-1package
libnet-server-perlignoredbullseyepackage
libnet-server-perlignoredbusterpackage
libnet-server-perlignoredstretchpackage
libnet-server-perlignoredjessiepackage
libnet-server-perlignoredwheezypackage
libnet-server-perlno-dsasqueezepackage

Примечания

  • https://rt.cpan.org/Ticket/Display.html?id=83909

  • 2.011 upstream adds 'double_reverse_lookups' configuration and code as fix

  • for the issue, but does not enable the checks by default. They need to be

  • enabled by consumers by setting 'reverse_lookups=double' or double_reverse_lookups=1'.

EPSS

Процентиль: 64%
0.00475
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Net-Server, when the reverse-lookups option is enabled, does not check if the hostname resolves to the source IP address, which might allow remote attackers to bypass ACL restrictions via the hostname parameter.

nvd
больше 11 лет назад

Net-Server, when the reverse-lookups option is enabled, does not check if the hostname resolves to the source IP address, which might allow remote attackers to bypass ACL restrictions via the hostname parameter.

suse-cvrf
почти 3 года назад

Security update for perl-Net-Server

suse-cvrf
почти 3 года назад

Security update for perl-Net-Server

github
больше 3 лет назад

Net-Server, when the reverse-lookups option is enabled, does not check if the hostname resolves to the source IP address, which might allow remote attackers to bypass ACL restrictions via the hostname parameter.

EPSS

Процентиль: 64%
0.00475
Низкий