Date: Tue, 19 Nov 1996 17:48:11 -0500 (EST) From: Security Officer <security@sinister.com> To: "S(pork)" <spork@super-g.com> Cc: freebsd-security@freebsd.org, freebsd-questions@freebsd.org Subject: Re: Serious BIND resolver problem. (fwd) Message-ID: <Pine.LNX.3.95.961119174603.12421G-100000@dark.sinister.com> In-Reply-To: <Pine.LNX.3.92.961119151129.1956A-100000@super-g.inch.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 19 Nov 1996, S(pork) wrote: > >From your friendly neighborhood paranoia victim comes yet another loaded > question... > > I got this little advisory (thankfully without an exploit) today, and it's > got me all worried. It's a problem in the whole gethostbyname call that > allows (supposedly) local and remote users to gain root access using a > variety of programs that rely on the gethostbyname call. So I downloaded > BIND-4.9.3-REL which fixes all of this; and then I read the README in the I think you want 4.9.5 > > ---------- Forwarded message ---------- > Date: Mon, 18 Nov 1996 22:54:03 -0700 > From: Oliver Friedrichs <oliver@secnet.com> > To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG> > Subject: Serious BIND resolver problem. > > > We recommend upgrading to the latest release of BIND which solves this > problem due to the incorporation of IPv6 address support. > > The latest official release of BIND is availible at: > > ftp.vix.com in the directory /pub/bind/release/4.9.5 > > --Dr. Who System Administrator Sinister Networks
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.95.961119174603.12421G-100000>