[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Bind exploit



Charlie Clemmer wrote:

> Chris,
>
> Another way to check to see whether named/BIND has been patched, is to log
> into the machine via SSH (you'll need to be logged in as root), and run
> "/usr/sbin/named -v". This will output the BIND release currently
> installed. You should be at 8.2.3. There are also some 9.x.x releases
> floating around, but from the sounds of things on Bugtraq, you probably
> want to be on 8.2.3 at the current time.
>
> Hope this helps.
> Charlie
>
> At 02:16 PM 2/11/01 +0100, you wrote:
> > > I have a new Raq3 with OS5 on it, is the Bind exploit patched in
> >this
> > > version or is there a patch available?
> > > Any other known exploits out there I should be aware of? I patched
> >SSH
> > > already.
> >If you do not see any other patches in the software list, then the
> >BIND exploit is *NOT* patches on your machine.
>
> _______________________________________________
> cobalt-users mailing list
> cobalt-users@xxxxxxxxxxxxxxx
> To Subscribe or Unsubscribe, please go to:
> http://list.cobalt.com/mailman/listinfo/cobalt-users

Yes, thanks, that's what I did and that's what it was.

Thanks again.