Here are a few years worth of known vulnerabilities in BIND.
http://www.cert.org/advisories/CA-2001-02.html
http://www.cert.org/advisories/CA-2000-20.html
http://www.cert.org/advisories/CA-2000-03.html
http://www.cert.org/advisories/CA-1999-14.html
http://www.cert.org/advisories/CA-98.05.bind_problems.html
Todd Ashworth --
Web Application Developer
Network Administrator
Saber Corporation
314 Oakland Ave.
Rock Hill, SC 29730
(803) 327-0137 [111]
----- Original Message -----
From: "Jim Nitterauer" <[EMAIL PROTECTED]>
To: "CF-Linux" <[EMAIL PROTECTED]>
Sent: Monday, March 05, 2001 12:28 PM
Subject: RE: named / dns
| Anybody have any specifics on how this is accomplished so we can nip it in
| the bud?
|
| -----Original Message-----
| From: Cameron Childress [mailto:[EMAIL PROTECTED]]
| Sent: Monday, March 05, 2001 11:00 AM
| To: CF-Linux
| Subject: RE: named / dns
|
|
| > This is a very SERIOUS problem
|
| I absolutely agree. In the last month or so, I have detected 10 or 15
| outside scans of my network on port 53. There are LOTS of people actively
| seeking to exploit this hole...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at
http://www.fusionauthority.com/bkinfo.cfm
------------------------------------------------------------------------------
Archives: http://www.mail-archive.com/cf-linux%40houseoffusion.com/
To Unsubscribe visit
http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_linux or send a
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.