>
> I ran a security check on ShareTheNet 2.1.3 and it reported:
Which one?

>
> The remote bind version is : 4.9.7-REL
> The remote BIND server, according to its
> version number, is vulnerable to various buffer
> overflows that may allow an attacker to
> gain a shell on this host.
>
> Solution : upgrade to bind 8.2.3 or 4.9.8
> Risk factor : High
>
> Anyone fixed this?  Any Clues?

There is no way to get a shell since there is no telnet server.  However, it
can probably be the subject of a DOS attack.  I'm in the process of building
the GPL release and will fix it then.

For now here are the choices:
1) Just leave it.
2) Disable DNS.  These days, unless you have a specific need for DNS (like
you're serving your own network), then your ISP's DNS is probably better
anyway.

Regards,
John

============================================================
Your shoe frustration is offline. Your shoe selection is
online... at Zappos.com. Hard-to-find sizes in brands like
Bass, Dexter, Hush Puppies, Skechers, and Steve Madden:
http://click.topica.com/caaabQIbz8Rp2bAfyICf/Zappos
============================================================

--
Visit http://www.ShareTheNet.com for info about ShareTheNet
Visit http://www.topica.com/lists/sharethenet for info about this list
To Unsubscribe send email to: [EMAIL PROTECTED]

==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?bz8Rp2.bAfyIC
Or send an email To: [EMAIL PROTECTED]
This email was sent to: [email protected]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to