From owner-freebsd-security Thu Jun 12 10:06:23 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id KAA07902 for security-outgoing; Thu, 12 Jun 1997 10:06:23 -0700 (PDT) Received: from xkis.kis.ru (dv@xkis.kis.ru [194.87.66.200]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id KAA07885 for ; Thu, 12 Jun 1997 10:06:07 -0700 (PDT) Received: from localhost (dv@localhost) by xkis.kis.ru (8.8.5/8.8.5) with SMTP id VAA11414 for ; Thu, 12 Jun 1997 21:05:37 +0400 (MSD) Date: Thu, 12 Jun 1997 21:05:37 +0400 (MSD) From: Dmitry Valdov To: freebsd-security@FreeBSD.ORG Subject: Re: DNS abuse (fwd) In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Thu, 12 Jun 1997, Dmitry Valdov wrote: > Date: Thu, 12 Jun 1997 20:04:34 +0400 (MSD) > From: Dmitry Valdov > To: freebsd-security@FreeBSD.ORG > Subject: DNS abuse (fwd) > > Hi! > > named in 2.1.5 is vulnerable... > Is 2.2.x's named vulnerable too? > I've just compiled 2.2.2's named (-static) and replaced it on my nameserver...(fbsd 2.1.5). It still vulnerable. So.. Is there any way to fix it? > > ---------- Forwarded message ---------- > Date: Thu, 12 Jun 1997 08:02:22 +0200 > From: Jordi Murgo > To: BUGTRAQ@NETSPACE.ORG > Subject: DNS abuse > > Test this URL to see if your DNS is abusable. > > http://apostols.org/toolz/dnshack.cgi > > ======================================= > >