I've been cracked via bind 4 times over the past year. Each bind was a
different version. The last time was my workstation on a LAN at work. Yes,
the LAN should of been firewalled, but more important is to not run
services that you don't really need. For workstations, use the workstation
install, and you'll get less services started automatically. Add those that
you need by hand after the install.
One last thing, does Redhat 6.2 configure bind to not run as root? Wouldn't
that keep buffer overflows from doing to much damage?
At 03:10 PM 4/22/00 -0400, Derek Martin wrote:
>I believe I have identified how my system was compromized. CERT has
>released this advisory regarding BIND 8.2:
>
> http://www.cert.org/advisories/CA-99-14-bind.html
>
>If you are running BIND on an Internet accessible RH6.1 machine, go get
>the updates NOW!
>
>--
>PGP/GPG Public key at http://cerberus.ne.mediaone.net/~derek/pubkey.txt
>------------------------------------------------------
>Derek D. Martin | Unix/Linux Geek
>[EMAIL PROTECTED] | [EMAIL PROTECTED]
>------------------------------------------------------
>
>
>**********************************************************
>To unsubscribe from this list, send mail to
>[EMAIL PROTECTED] with the following text in the
>*body* (*not* the subject line) of the letter:
>unsubscribe gnhlug
>**********************************************************
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************