Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

Net::DNS::Question - DNS question class

SYNOPSIS

use Net::DNS::Question

DESCRIPTION

A Net::DNS::Question object represents a record in the question section of a DNS packet.

METHODS

new

$question = new Net::DNS::Question("foo.com", "MX", "IN");

Creates a question object from the domain, type, and class passed as arguments.

qname

print "qname = ", $question->qname, "\n";

Returns the domain name.

qtype

print "qtype = ", $question->qtype, "\n";

Returns the record type.

qclass

print "qclass = ", $question->qclass, "\n";

Returns the record class.

print

$question->print;

Prints the question record on the standard output.

data

$qdata = $question->data;

Returns the question record in binary format suitable for inclusion in a DNS packet.

COPYRIGHT

Copyright (c) 1997 Michael Fuhr. All rights reserved. This program is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

SEE ALSO

perl(1), Net::DNS, Net::DNS::Resolver, Net::DNS::Packet, Net::DNS::Header, Net::DNS::RR, RFC 1035 Section 4.1.2