[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[atlarge-discuss] FYI: re multiple BIND vulnerabilities
People running servers who have not already done so may want to look at:
http://www.cert.org/advisories/CA-2002-31.html
and
Title: BIND vulnerable to cached RR overflow
ID: 11152
Category: Gain root remotely
URL: http://www.securityspace.com/smysecure/catid.html?id=11152
Summary: Checks the remote BIND version
and
Title: Generic format string
ID: 11133
Category: Gain root remotely
URL: http://www.securityspace.com/smysecure/catid.html?id=11133
Summary: Generic format string attack
Description:
The remote service is vulnerable to a format string attack
An attacker may use this flaw to execute arbitrary code
on your machine.
HTH,
Judyth
#######"Judyth la pomme" <espresso@e-scape.net>###########
() Eliminate computer viruses! Join the ASCII ribbon
/\ campaign against HTML/XML e-mail and risky attachments
#### ##### ##### ##### ##### ##### ##### ##### ##### #####
## "You can fix it on the drawing board with an eraser ##
## or you can fix it on the site with a sledgehammer." ##
# « Vous pouvez le corriger ou avec une gomme à effacer #
## sur le dessin ou avec une masse sur le site ... ###
#### - Frank Lloyd Wright ####
####### ##### ##### ##### ##### ##### ##### ##### ########
---------------------------------------------------------------------
To unsubscribe, e-mail: atlarge-discuss-unsubscribe@lists.fitug.de
For additional commands, e-mail: atlarge-discuss-help@lists.fitug.de