[ale] Bind vulnerability
Stuffed Crust
pizza at shaftnet.org
Mon Jan 29 16:25:17 EST 2001
According to:
http://www.isc.org/products/BIND/bind-security.html
On the 26th of January, a vunlerability was discovewred in *ALL* 8.2.x
versions of bind that is virtually guaranteed to give an attacker
access.
"CRITICAL" severity. :)
Since redhat hasn't given us new RPMs yet, I built a set for us folks
who use RH 6.x:
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-utils-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-devel-8.2.3-0.1.i386.rpm
and
ftp://ftp.shaftnet.org/pub/rpms/SRPMS/bind-8.2.3-0.1.src.rpm
So let's try to head the script kiddies off at the pass, hmm?
- Pizza
--
Solomon Peachy pizzaATfucktheusers.org
I ain't broke, but I'm badly bent. ICQ# 1318344
Patience comes to those who wait.
...It's not "Beanbag Love", it's a "Transanimate Relationship"...
--
To unsubscribe: mail majordomo at ale.org with "unsubscribe ale" in message body.
More information about the Ale
mailing list