[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[atlarge-discuss] FYI: re multiple BIND vulnerabilities



People running servers who have not already done so may want to look at:

   http://www.cert.org/advisories/CA-2002-31.html

and

 Title: BIND vulnerable to cached RR overflow
 ID: 11152
 Category: Gain root remotely
 URL: http://www.securityspace.com/smysecure/catid.html?id=11152
 Summary: Checks the remote BIND version

and

 Title: Generic format string
 ID: 11133
 Category: Gain root remotely
 URL: http://www.securityspace.com/smysecure/catid.html?id=11133
 Summary: Generic format string attack
 Description:
   The remote service is vulnerable to a format string attack
   
   An attacker may use this flaw to execute arbitrary code 
   on your machine.

HTH,

Judyth


#######"Judyth la pomme" <espresso@e-scape.net>###########
()  Eliminate computer viruses! Join the ASCII ribbon
/\  campaign against HTML/XML e-mail and risky attachments
#### ##### ##### ##### ##### ##### ##### ##### ##### #####
## "You can fix it on the drawing board with an eraser  ##
## or you can fix it on the site with a sledgehammer."  ##
# « Vous pouvez le corriger ou avec une gomme à effacer  #
##   sur le dessin ou avec une masse sur le site ...   ###
####                         - Frank Lloyd Wright     ####
####### ##### ##### ##### ##### ##### ##### ##### ########





---------------------------------------------------------------------
To unsubscribe, e-mail: atlarge-discuss-unsubscribe@lists.fitug.de
For additional commands, e-mail: atlarge-discuss-help@lists.fitug.de