Date: Sat, 17 Feb 1996 19:35:56 +1030 (CST) From: Michael Smith <msmith@atrad.adelaide.edu.au> To: ghelmer@alpha.dsu.edu (Guy Helmer) Cc: freebsd-security@FreeBSD.org Subject: Re: named update Message-ID: <199602170905.TAA01376@genesis.atrad.adelaide.edu.au> In-Reply-To: <Pine.OSF.3.91.960216090524.4301D-100000@alpha.dsu.edu> from "Guy Helmer" at Feb 16, 96 09:15:53 am
next in thread | previous in thread | raw e-mail | index | archive | help
Guy Helmer stands accused of saying: > > Does anyone know the named version details surrounding the named problem > that CERT just reported? I just don't know which version tries to close > up the hole. Is named in 2.0.5 and 2.1.0 a vulnerable version? Is this the one involving a syslog() buffer overrun? (The one that allegedly bit a pile of linux-using ISP's in WA recently 8) AFAIK, FreeBSD 2.1 and later is not vulnerable to any syslog-overflow exploit. > Guy Helmer, Dakota State University Computing Services - ghelmer@alpha.dsu.edu -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] Collector of old Unix hardware. "I seek PEZ!" - The Tick [[
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602170905.TAA01376>