[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] BIND vulnerability



Graeme Fowler wrote:

> Sorry to take you to task over this, Jeff, but Dom is exactly right. The
> *vulnerability* is there, sure, but all it gives you is the opportunity
> to run arbitrary code on the machine (where code in this case means CPU
> specific code) which may then give you remote access. What you do with
> that remote access (run a shell bound to a port, shutdown the machine,
> remove the zone files, whatever) is entirely dependent on the *exploit*
> code rather than the vulnerability itself.

I'll take my lashes, okay, but under mild protest <smile>, since I still
think you can run interpreted code on a RaQ to make use of an exploit.

Neverthless, maybe I'll go out and buy a few dozen old RaQ2s to use for
dns all over the world with old copies of bind <smile>.

Jeff
-- 
Jeff Lasman <jblists@xxxxxxxxxxxxx>
nobaloney.net
P. O. Box 52672
Riverside, CA  92517
voice: (909) 787-8589  *  fax: (909) 782-0205