[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[cobalt-users] BIND vulnerability
- Subject: [cobalt-users] BIND vulnerability
- From: "Neil Highley" <neilhighley@xxxxxxxxxx>
- Date: Tue Jan 30 05:31:01 2001
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
How do I check my Raq2 running redhat 2.0 for the BIND version and how do I
update it?
[Take from CERT Site]
CERT® Advisory CA-2001-02 Multiple Vulnerabilities in BIND
Original release date: January 29, 2001
Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
Systems Affected
Domain Name System (DNS) Servers running various versions of ISC BIND
(including both 4.9.x prior to 4.9.8 and 8.2.x prior to 8.2.3; 9.x is not
affected) and derivatives. Because the normal operation of most services on
the Internet depends on the proper operation of DNS servers, other services
could be impacted if these vulnerabilities are exploited.
Overview
The CERT/CC has recently learned of four vulnerabilities spanning multiple
versions of the Internet Software Consortium's (ISC) Berkeley Internet Name
Domain (BIND) server. BIND is an implementation of the Domain Name System
(DNS) that is maintained by the ISC. Because the majority of name servers in
operation today run BIND, these vulnerabilities present a serious threat to
the Internet infrastructure.
[End of excerpt]
Full text:
http://www.cert.org/advisories/CA-2001-02.html
neilhighley@xxxxxxxxxx
-------------------------------------------------------
Come with me,
and you'll be,
In a world of pure imagination.
We'll begin,
With a spin,
Travelling in a world of my creation.
-Willy Wonka
-------------------------------------------------------