John...

I found this on http://www.cert.org

HopeItHelps

                                --==jb==--





CERT* Advisory CA-98.05
Original issue date: April 08, 1998
Last Revised: November 16, 1998    Added vendor information for Data General
A complete revision history is at the end of this file.



----------------------------------------------------------------------------
----

Topic: Multiple Vulnerabilities in BIND
Inverse Query Buffer Overrun in BIND 4.9 and BIND 8 Releases 
Denial-of-Service Vulnerabilities in BIND 4.9 and BIND 8 Releases 
Denial-of-Service Vulnerability in BIND 8 Releases 

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
John Burton
Sr. Project Lead
Rural Y2K Systems
INTEGRIS Health/Information Systems
Voice: (405)951-8613
Fax: (405)951-9832


-----Original Message-----
From: John Lombardo [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, June 29, 1999 9:54 AM
To: [EMAIL PROTECTED]
Subject: RE: [ShareTheNet] Bind/DNS Question


Hi Steve,

Do you have any more information (URL's) that tell what the attacks are?

Regards,
John

> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of The Rosens
> Sent: Monday, June 28, 1999 7:26 PM
> To: [EMAIL PROTECTED]
> Subject: [ShareTheNet] Bind/DNS Question
> 
> 
> I've heard that there was some security issues with early versions of
> the Bind package - which release is included in STN? Is it "hackable"?
> 
> ...steve...
> 
> 
> _______________________________________________
> ShareTheNet maillist  -  [EMAIL PROTECTED]
> http://www.webserv.com/mailman/listinfo/sharethenet
> 

_______________________________________________
ShareTheNet maillist  -  [EMAIL PROTECTED]
http://www.webserv.com/mailman/listinfo/sharethenet

_______________________________________________
ShareTheNet maillist  -  [EMAIL PROTECTED]
http://www.webserv.com/mailman/listinfo/sharethenet

Reply via email to