Date: Tue, 19 Nov 1996 16:54:05 -0600 (CST) From: "S(pork)" <spork@super-g.com> To: Security Officer <security@sinister.com> Cc: freebsd-security@freebsd.org, freebsd-questions@freebsd.org Subject: Re: Serious BIND resolver problem. (fwd) Message-ID: <Pine.LNX.3.92.961119165327.1956B-100000@super-g.inch.com> In-Reply-To: <Pine.LNX.3.95.961119174603.12421G-100000@dark.sinister.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Whoops, yeah, 4.9.5; question still stands... sorry... Charles On Tue, 19 Nov 1996, Security Officer wrote: > > > On Tue, 19 Nov 1996, S(pork) wrote: > > > >From your friendly neighborhood paranoia victim comes yet another loaded > > question... > > > > I got this little advisory (thankfully without an exploit) today, and it's > > got me all worried. It's a problem in the whole gethostbyname call that > > allows (supposedly) local and remote users to gain root access using a > > variety of programs that rely on the gethostbyname call. So I downloaded > > BIND-4.9.3-REL which fixes all of this; and then I read the README in the > > I think you want 4.9.5 > > > > > > ---------- Forwarded message ---------- > > Date: Mon, 18 Nov 1996 22:54:03 -0700 > > From: Oliver Friedrichs <oliver@secnet.com> > > To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG> > > Subject: Serious BIND resolver problem. > > > > > > > > We recommend upgrading to the latest release of BIND which solves this > > problem due to the incorporation of IPv6 address support. > > > > The latest official release of BIND is availible at: > > > > ftp.vix.com in the directory /pub/bind/release/4.9.5 > > > > > > > --Dr. Who > > System Administrator > Sinister Networks > > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.92.961119165327.1956B-100000>