[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Bind exploit



Chris,

Another way to check to see whether named/BIND has been patched, is to log into the machine via SSH (you'll need to be logged in as root), and run "/usr/sbin/named -v". This will output the BIND release currently installed. You should be at 8.2.3. There are also some 9.x.x releases floating around, but from the sounds of things on Bugtraq, you probably want to be on 8.2.3 at the current time.

Hope this helps.
Charlie

At 02:16 PM 2/11/01 +0100, you wrote:
> I have a new Raq3 with OS5 on it, is the Bind exploit patched in
this
> version or is there a patch available?
> Any other known exploits out there I should be aware of? I patched
SSH
> already.
If you do not see any other patches in the software list, then the
BIND exploit is *NOT* patches on your machine.