[ale] Bind vulnerability

Stuffed Crust pizza at shaftnet.org
Mon Jan 29 16:25:17 EST 2001


According to:

http://www.isc.org/products/BIND/bind-security.html

On the 26th of January, a vunlerability was discovewred in *ALL* 8.2.x
versions of bind that is virtually guaranteed to give an attacker
access.
"CRITICAL" severity.  :)

Since redhat hasn't given us new RPMs yet, I built a set for us folks
who use RH 6.x:

ftp://ftp.shaftnet.org/pub/rpms/i386/bind-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-utils-8.2.3-0.1.i386.rpm
ftp://ftp.shaftnet.org/pub/rpms/i386/bind-devel-8.2.3-0.1.i386.rpm

and

ftp://ftp.shaftnet.org/pub/rpms/SRPMS/bind-8.2.3-0.1.src.rpm

So let's try to head the script kiddies off at the pass, hmm?

 - Pizza
-- 
Solomon Peachy                                    pizzaATfucktheusers.org
I ain't broke, but I'm badly bent.                           ICQ# 1318344
Patience comes to those who wait.
    ...It's not "Beanbag Love", it's a "Transanimate Relationship"...
--
To unsubscribe: mail majordomo at ale.org with "unsubscribe ale" in message body.





More information about the Ale mailing list