From owner-freebsd-questions Wed May 9 10:30:21 2001 Delivered-To: freebsd-questions@freebsd.org Received: from cluck.stealthchickens.org (cluck.stealthchickens.org [209.192.217.153]) by hub.freebsd.org (Postfix) with ESMTP id 25FFB37B42C for ; Wed, 9 May 2001 10:30:08 -0700 (PDT) (envelope-from mij@osdn.com) Received: from guinness.osdn.com (root@localhost [127.0.0.1]) by cluck.stealthchickens.org (8.11.3/8.11.3) with ESMTP id f49HU7254639; Wed, 9 May 2001 13:30:07 -0400 (EDT) (envelope-from mij@osdn.com) Received: by guinness.osdn.com (Postfix, from userid 1000) id D444FF7; Wed, 9 May 2001 13:30:06 -0400 (EDT) Date: Wed, 9 May 2001 13:30:06 -0400 From: Jim Mock To: webmaster Cc: freebsd-questions@FreeBSD.ORG Subject: Re: A new bind vulberability? Message-ID: <20010509133006.C1288@guinness.osdn.com> Reply-To: mij@osdn.com References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.17i In-Reply-To: ; from russ@mtanet.net on Wed, May 09, 2001 at 11:26:46AM -0600 Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Wed, 09 May 2001 at 11:26:46 -0600, webmaster wrote: > Hi, > > I have two dns servers running freebsd/bind 8.2.3-T6B in which bind > appears to be vulnerable to version questions asked in a certain > manner. That is a known vulnerable version of bind. You should be running at least 8.2.3-REL. Take a look at: ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:18.bind.asc (If you can't get into the main ftp site, try a mirror.) All versions prior to 8.2.3-RELEASE contain a remotely exploitable buffer overflow. If you see the same problems in 8.2.3-REL or later, let us know. - jim -- - jim mock - O|S|D|N - open source development network - - http://www.freebsdzine.org/ - jim@freebsdzine.org - jim@FreeBSD.org - To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message