[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-developers] pscan bind exploit
- Subject: RE: [cobalt-developers] pscan bind exploit
- From: "Rob van Eijk" <rob@xxxxxxxxxxxx>
- Date: Thu May 24 20:40:06 2001
- List-id: Discussion Forum for developers on Cobalt Networks products <cobalt-developers.list.cobalt.com>
[: What updates are required to prevent the bind exploit on a raq3. I emailed
: support @cobalt.com two days ago but got know response.]
-- snip --
http://www.cert.org/advisories/CA-2001-02.html
"Domain Name System (DNS) Servers running various versions of ISC BIND (including both 4.9.x prior to 4.9.8 and 8.2.x prior to 8.2.3; 9.x is not affected) and derivatives. Because the normal operation of most services on the Internet depends on the proper operation of DNS servers, other services could be impacted if these vulnerabilities are exploited"
-- un-snip --
So you should be ok with the following pkg-file:
-- snip --
RaQ3-All-Security-4.0.2-9353.pkg Posted: February 6, 2001
"This patch upgrades the version of bind used by DNS to 8.2.3. This version of bind contains various security fixes for security holes that were found in BIND-8.2.2_P5.
NOTE: You may need to restart the DNS service under the control panel after installing this patch."
-- un-snip --
--
MVG,
Rob van Eijk
www.blaeu.com