{"id":"UBUNTU-CVE-2013-1841","details":"Net-Server, when the reverse-lookups option is enabled, does not check if the hostname resolves to the source IP address, which might allow remote attackers to bypass ACL restrictions via the hostname parameter.","modified":"2025-10-24T04:45:00Z","published":"2014-06-13T14:55:00Z","upstream":["CVE-2013-1841"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-1841"},{"type":"REPORT","url":"https://rt.cpan.org/Ticket/Display.html?id=83909"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2013/03/04/10"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-1841"}],"affected":[{"package":{"name":"libnet-server-perl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libnet-server-perl@2.007-3?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.007-3"],"ecosystem_specific":{"binaries":[{"binary_version":"2.007-3","binary_name":"libnet-server-perl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1841.json"}},{"package":{"name":"libnet-server-perl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libnet-server-perl@2.008-2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.008-2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.008-2","binary_name":"libnet-server-perl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1841.json"}},{"package":{"name":"libnet-server-perl","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/libnet-server-perl@2.009-1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.008-4","2.009-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2.009-1","binary_name":"libnet-server-perl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1841.json"}},{"package":{"name":"libnet-server-perl","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libnet-server-perl@2.009-2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.009-1","2.009-2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.009-2","binary_name":"libnet-server-perl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1841.json"}},{"package":{"name":"libnet-server-perl","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libnet-server-perl@2.009-2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.009-2"],"ecosystem_specific":{"binaries":[{"binary_version":"2.009-2","binary_name":"libnet-server-perl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-1841.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"low"}]}