John...
I found this on http://www.cert.org
HopeItHelps
--==jb==--
CERT* Advisory CA-98.05
Original issue date: April 08, 1998
Last Revised: November 16, 1998 Added vendor information for Data General
A complete revision history is at the end of this file.
----------------------------------------------------------------------------
----
Topic: Multiple Vulnerabilities in BIND
Inverse Query Buffer Overrun in BIND 4.9 and BIND 8 Releases
Denial-of-Service Vulnerabilities in BIND 4.9 and BIND 8 Releases
Denial-of-Service Vulnerability in BIND 8 Releases
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
John Burton
Sr. Project Lead
Rural Y2K Systems
INTEGRIS Health/Information Systems
Voice: (405)951-8613
Fax: (405)951-9832
-----Original Message-----
From: John Lombardo [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, June 29, 1999 9:54 AM
To: [EMAIL PROTECTED]
Subject: RE: [ShareTheNet] Bind/DNS Question
Hi Steve,
Do you have any more information (URL's) that tell what the attacks are?
Regards,
John
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of The Rosens
> Sent: Monday, June 28, 1999 7:26 PM
> To: [EMAIL PROTECTED]
> Subject: [ShareTheNet] Bind/DNS Question
>
>
> I've heard that there was some security issues with early versions of
> the Bind package - which release is included in STN? Is it "hackable"?
>
> ...steve...
>
>
> _______________________________________________
> ShareTheNet maillist - [EMAIL PROTECTED]
> http://www.webserv.com/mailman/listinfo/sharethenet
>
_______________________________________________
ShareTheNet maillist - [EMAIL PROTECTED]
http://www.webserv.com/mailman/listinfo/sharethenet
_______________________________________________
ShareTheNet maillist - [EMAIL PROTECTED]
http://www.webserv.com/mailman/listinfo/sharethenet