[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: BIND compromise




KoReE wrote:
> 
> Watch out if you're running BIND 4.9.5, 4.9.6 or 8.1.x.  There's a nifty
> little buffer overflow program on www.rootshell.com that allows users to
> get a root shell.  I had a system compromised in this way.  You're
> probably vulnerable if you're running redhat 5.0 or 5.1 with the shipped
> nameserver.  4.9.3 is not vulnerable, but, the program does kill the
> nameserver off.  So, I guess it's a DoS in that respect.  Just thought I'd
> heads-up ya guys.
> 

Are there any releases past 4.9.6 or 8.1.x that fix the problem, or
should I just revert back to 4.9.3?

- Matt

--
To unsubscribe, send email to majordomo@silug.org with
"unsubscribe silug-discuss" in the body.