Date: Thu, 07 Jul 2011 21:16:23 -0400 From: Glen Barber <glen.j.barber@gmail.com> To: Michael Scheidell <michael.scheidell@secnap.com> Cc: freebsd-security@freebsd.org Subject: Re: new bind security bug? Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-11:02.bind Message-ID: <4E165A67.6020609@gmail.com> In-Reply-To: <4E1652AF.8000000@secnap.com> References: <201105280928.p4S9SxXg051018@freefall.freebsd.org> <4DF79534.6060507@acsalaska.net> <4E1652AF.8000000@secnap.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 7/7/11 8:43 PM, Michael Scheidell wrote: > <http://threatpost.com/en_us/blogs/new-bind-release-fixes-high-severity-remote-bugs-070611> > > > The high-severity vulnerability in many versions of the BIND software > has the effect of causing the BIND server to exit when it receives a > specially formatted packet. The ISC said that although it isn't aware of > any public exploits for the bug, it still recommends that organizations > upgrade to one of the newer versions of BIND, which include > 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4. > See: http://svnweb.freebsd.org/base?view=revision&revision=223815 Regards, -- Glen Barber
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E165A67.6020609>
