Security Advisories (3)
CVE-2007-6341 (2008-02-08)

Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.

CVE-2007-3409 (2007-06-26)

Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.

CVE-2007-3377 (2007-06-25)

Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.

NAME

Net::DNS::RR::NAPTR - DNS NAPTR resource record

SYNOPSIS

use Net::DNS::RR;

DESCRIPTION

Class for DNS Naming Authority Pointer (NAPTR) resource records.

METHODS

order

print "order = ", $rr->order, "\n";

Returns the order field.

preference

print "preference = ", $rr->preference, "\n";

Returns the preference field.

flags

print "flags = ", $rr->flags, "\n";

Returns the flags field.

service

print "service = ", $rr->service, "\n";

Returns the service field.

regexp

print "regexp = ", $rr->regexp, "\n";

Returns the regexp field.

replacement

print "replacement = ", $rr->replacement, "\n";

Returns the replacement field.

COPYRIGHT

Copyright (c) 1997-2002 Michael Fuhr.

Portions Copyright (c) 2002-2004 Chris Reinhardt.

All rights reserved. This program is free software; you may redistribute it and/or modify it under the same terms as Perl itself.

Net::DNS::RR::NAPTR is based on code contributed by Ryan Moats.

SEE ALSO

perl(1), Net::DNS, Net::DNS::Resolver, Net::DNS::Packet, Net::DNS::Header, Net::DNS::Question, Net::DNS::RR, RFC 2168