Date: Thu, 9 Nov 2000 20:18:32 +0200 (SAST) From: Justin Stanford <jus@security.za.net> To: Michael Bryan <fbsd-secure@ursine.com> Cc: freebsd-security@freebsd.org Subject: Re: DOS vulnerability in BIND 8.2.2-P5 Message-ID: <Pine.BSF.4.21.0011092017530.341-100000@athena.za.net> In-Reply-To: <3A0AE5DF.39893E59@ursine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I could not get my 4.1.1-STABLE machine's named to crash no matter what I did. Reports indicate any of the 4.x-STABLE branch are not vulnerable. -- Justin Stanford 082 7402741 jus@security.za.net www.security.za.net IT Security and Solutions On Thu, 9 Nov 2000, Michael Bryan wrote: > > For those who haven't yet seen the messages in BugTraq, there is > a DOS vulnerability in BIND 8.2.2-P5. Sending a ZXFR request to > a server can cause it to crash. (The crash might happen a few > minutes after the ZXFR request, as it sets something up for a later > failure.) If BIND is setup to restrict zone transfers to only those > hosts that you trust, only those hosts can trigger the bug, so that's > the easiest way to protect yourself. Sites that don't have an > "allow-transfer" acl restriction on zone transfers are wide open to > this DOS attack, though, and there are apparently a lot of sites > which are wide open like this. > > > The original BugTraq article is here: > > http://www.securityfocus.com/archive/1/143843 > > It appears that 8.2.3-T5B, 8.2.3-T6B and 9.0.0 are not vulnerable, > but 8.2.2-P3 and 8.2.2-P5 have been confirmed to be vulnerable under > FreeBSD. > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0011092017530.341-100000>