Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: BIND 4 & 8 Buffer Overflow. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

BIND 4 & 8 Buffer Overflow
by Rattle at 5:11 pm EST, Nov 12, 2002

] The vulnerabilities described in this advisory affect
] nearly all currently deployed recursive DNS servers on
] the Internet. The DNS network is considered a critical
] component of Internet infrastructure. There is no
] information implying that these exploits are known to the
] computer underground, and there are no reports of active
] attacks. If exploits for these vulnerabilities are

] developed and made public, they may lead to compromise
] and DoS attacks against vulnerable DNS servers. Since the
] vulnerability is widespread, an Internet worm may be
] developed to propagate by exploiting the flaws in BIND.
] Widespread attacks against the DNS system may lead to
] general instability and inaccuracy of DNS data.

You should be running BIND 9. If you are running BIND 8, then this is a good time to upgrade. If you are running BIND 4, you should be made aware that it is now 2002, not 1994.


 
 
Powered By Industrial Memetics