Search results
Search results
Debian security update to bind
([Security]
Posted Nov 14, 2002 19:06 UTC (Thu)
by ris )
CVE Id : CAN-2002-1219 CAN-2002-1220 CAN-2002-1221 CERT advisory : VU#844360 VU#852283 VU#229595 VU#542971 [Bind version 9, the bind9 package, is not affected by these problems.] ISS X-Force has discovered several serious vulnerabilities in the Berkeley Internet Name Domain Server (BIND). BIND
SuSE security update to bind8
([Security]
Posted Nov 14, 2002 17:34 UTC (Thu)
by ris )
CVE CAN-2002-1219, CAN-2002-1220, CAN-2002-1221, http://www.isc.org/products/BIND/bind-security.html http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469 Content of this advisory: 1) security vulnerability resolved: Remote command execution in bind8 name server. problem description, discussion, solution and upgrade information 2) pending vulnerabilities, solutions, workarounds: BIND4, reports of trojanized tcpdump/libpcap 3) standard
CERT Advisory CA-2002-31 Multiple Vulnerabilities in BIND
([Security]
Posted Nov 14, 2002 17:27 UTC (Thu)
by ris )
-2002-19. The following DNS stub resolver libraries are known to be affected: - BIND 4.9.2 through 4.9.10 The status of other resolver libraries derived from BIND 4 such as BSD libc, GNU glibc, and those used by System V UNIX systems is currently unknown. Additionally, these issues are mapped to CVE as follows. VU#852283 - CAN-2002-1219 VU#229595 - CAN-2002-1220 VU#581682 - CAN-2002-1221
Red Hat alert: Remote vulnerabilities in BIND 4 and 8
([Security]
Posted Nov 12, 2002 21:12 UTC (Tue)
by ris )
CVE Names: CAN-2002-1219 CAN-2002-1220 CAN-2002-1221 --------------------------------------------------------------------- 1. Problem description: BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. Three remotely exploitable vulnerabilities were disclosed by ISC on 12 November 2002 that affect various versions of BIND 4 and 8. Versions