drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in bind
Name: |
Pufferüberlauf in bind
|
|
ID: |
|
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Sa, 17. August 2002, 13:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
BIND |
|
Originalnachricht |
--=.MCFSFf8vEsNOj5 Content-Transfer-Encoding: 7bit
----------------------------------------------------------------------- GLSA: GENTOO LINUX SECURITY ANNOUNCEMENT ----------------------------------------------------------------------- PACKAGE : net-dns/bind and net-dns/bind-tools VERSION : 9.2.1 SUMMARY : buffer overflow vulnerability DATE : Mon Aug 12 18:52:32 UTC 2002 -----------------------------------------------------------------------
OVERVIEW
A buffer overflow exists in bind and bind-tools versions 9.2.1 which may allow an attacker to execute arbitrary code, if s/he controls the DNS responses.
DETAIL
The full advisory may be found here:
http://www.kb.cert.org/vuls/id/803539
SOLUTION
It is recommended that all Gentoo Linux users who are running net-dns/bind-9.2.1-r2 and/or net-dns/bind-9.2.1 and earlier update their systems as follows.
emerge rsync emerge bind (and/or emerge bind-tools) emerge clean
------------------------------------------------------------------------ kevin@aptbasilicata.it seemant@gentoo.org drobbins@gentoo.org ------------------------------------------------------------------------
-- Seemant Kulleen Developer and Project Co-ordinator, Gentoo Linux http://www.gentoo.org/~seemant
--=.MCFSFf8vEsNOj5
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE9XMIBcuYjzCJe+GYRAtjbAJ91yL+6leu5r2aWQo/4wLYP3Ar0+ACfQnXG UrKXmP3/I0u/h1GlCyEh33o= =+JtS -----END PGP SIGNATURE-----
--=.MCFSFf8vEsNOj5--
_______________________________________________ gentoo-security mailing list gentoo-security@gentoo.org http://lists.gentoo.org/mailman/listinfo/gentoo-security
|
|
|
|