[EMAIL PROTECTED] wrote:
> > I ran a security check on ShareTheNet 2.1.3 and it reported:
> Which one?
http://www.vulnerabilities.org/analysis.html
> > The remote bind version is : 4.9.7-REL
> > The remote BIND server, according to its
> > version number, is vulnerable to various buffer
> > overflows that may allow an attacker to
> > gain a shell on this host.
> >
> > Solution : upgrade to bind 8.2.3 or 4.9.8
> > Risk factor : High
> >
> > Anyone fixed this? Any Clues?
>
> There is no way to get a shell since there is no telnet server.
> However, it
> can probably be the subject of a DOS attack. I'm in the process of
> building
> the GPL release and will fix it then.
Cool, I was trying to be a good citizen and avoid contributing to a DDOS
attack, but it sounds like that's not the case.
Thanks,
Phil
============================================================
Get your FREE online credit report from ConsumerInfo.Com!
ConsumerInfo.Com makes staying on top of your credit history
fast and easy. Gain peace of mind and take control of the
accuracy of your credit report today! Click Here!
http://click.topica.com/caaactNbz8Rp2bAfyICf/ConsumerInfo
============================================================
--
Visit http://www.ShareTheNet.com for info about ShareTheNet
Visit http://www.topica.com/lists/sharethenet for info about this list
To Unsubscribe send email to: [EMAIL PROTECTED]
==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?bz8Rp2.bAfyIC
Or send an email To: [EMAIL PROTECTED]
This email was sent to: [email protected]
T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================