[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-users] BIND vulnerability



How do I check my Raq2 running redhat 2.0 for the BIND version and how do I
update it?

[Take from CERT Site]
CERT® Advisory CA-2001-02 Multiple Vulnerabilities in BIND
Original release date: January 29, 2001
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected
Domain Name System (DNS) Servers running various versions of ISC BIND
(including both 4.9.x prior to 4.9.8 and 8.2.x prior to 8.2.3; 9.x is not
affected) and derivatives. Because the normal operation of most services on
the Internet depends on the proper operation of DNS servers, other services
could be impacted if these vulnerabilities are exploited.

Overview
The CERT/CC has recently learned of four vulnerabilities spanning multiple
versions of the Internet Software Consortium's (ISC) Berkeley Internet Name
Domain (BIND) server. BIND is an implementation of the Domain Name System
(DNS) that is maintained by the ISC. Because the majority of name servers in
operation today run BIND, these vulnerabilities present a serious threat to
the Internet infrastructure.
[End of excerpt]

Full text:
http://www.cert.org/advisories/CA-2001-02.html



neilhighley@xxxxxxxxxx
-------------------------------------------------------
Come with me,
and you'll be,
In a world of pure imagination.
We'll begin,
With a spin,
Travelling in a world of my creation.
-Willy Wonka
-------------------------------------------------------