Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 22 Feb 2001 07:56:14 -0600 (CST)
From:      Chris Byrnes <chris@jeah.net>
To:        Michael Richards <michael@fastmail.ca>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: Bind problems
Message-ID:  <Pine.BSF.4.33.0102220755090.92526-100000@awww.jeah.net>
In-Reply-To: <3A947710.000009.60978@frodo.searchcanada.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
Anything before -REL is succeptable to the vulns.

I was running 8.2.3-T6B as well, and assumed because the 8.2.3 was there
that I was fine.  Then I did some further reading and found out "oops".


-cb

On Wed, 21 Feb 2001, Michael Richards wrote:

> Since the big BIND vulnerability, I checked all my versions of BIND
> to make sure they weren't the 8.2.2 variety. None were.
>
> Most returned: named 8.2.3-T6B Thu Nov 23 19:00:06 EST 2000
> Which is not supposed to be vulnerable.
>
> Not too long after the exploit became publically widespread, I
> noticed that my bind was randomly crashing. This machine had run for
> months without any sort of bind problem. I should kept the core files
> but I did notice that they segfaulted at location 0x41414141.
>
> This looked a little suspicious to me so I immediately cvsuped. The
> new version is: named 8.2.3-REL Sun Feb 18 11:47:44 EST 2001 and has
> not crashed since the 18th when I compiled it. Before it was crashing
> daily.
>
> Any ideas if named 8.2.3-T6B in 4.2-RELEASE has problems?
>
> -Michael
> _________________________________________________________________
>      http://fastmail.ca/ - Fast Free Web Email for Canadians


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.33.0102220755090.92526-100000>