Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 17 Feb 1996 19:35:56 +1030 (CST)
From:      Michael Smith <msmith@atrad.adelaide.edu.au>
To:        ghelmer@alpha.dsu.edu (Guy Helmer)
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: named update
Message-ID:  <199602170905.TAA01376@genesis.atrad.adelaide.edu.au>
In-Reply-To: <Pine.OSF.3.91.960216090524.4301D-100000@alpha.dsu.edu> from "Guy Helmer" at Feb 16, 96 09:15:53 am

next in thread | previous in thread | raw e-mail | index | archive | help
Guy Helmer stands accused of saying:
> 
> Does anyone know the named version details surrounding the named problem
> that CERT just reported?  I just don't know which version tries to close
> up the hole.  Is named in 2.0.5 and 2.1.0 a vulnerable version? 

Is this the one involving a syslog() buffer overrun? (The one that 
allegedly bit a pile of linux-using ISP's in WA recently 8)

AFAIK, FreeBSD 2.1 and later is not vulnerable to any syslog-overflow
exploit.  

> Guy Helmer, Dakota State University Computing Services - ghelmer@alpha.dsu.edu

-- 
]] Mike Smith, Software Engineer        msmith@atrad.adelaide.edu.au    [[
]] Genesis Software                     genesis@atrad.adelaide.edu.au   [[
]] High-speed data acquisition and      (GSM mobile) 0411-222-496       [[
]] realtime instrument control          (ph/fax)  +61-8-267-3039        [[
]] Collector of old Unix hardware.      "I seek PEZ!" - The Tick        [[



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602170905.TAA01376>