Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Aug 1998 10:24:26 +0100
From:      "Greg Quinlan" <gquinlan@qmpgmc.ac.uk>
To:        "Greg Quinlan" <gquinlan@qmpgmc.ac.uk>, <freebsd-questions@FreeBSD.ORG>
Cc:        <ronno@blaze.net.au>
Subject:   Re: MSCAN - named - Vulnerability
Message-ID:  <01bdc11c$0140a220$380051c2@greg.qmpgmc.ac.uk>

next in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format.

------=_NextPart_000_005F_01BDC124.63050A20
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

This reference may also be useful:

ftp://ftp.cert.org/pub/cert_advisories/CA-98.05.bind_problems

Basically what version of BIND is FreeBSD using?
-----Original Message-----
    From: Greg Quinlan <gquinlan@qmpgmc.ac.uk>
    To: freebsd-questions@freebsd.org <freebsd-questions@freebsd.org>
    Cc: ronno@blaze.net.au <ronno@blaze.net.au>
    Date: 06 August 1998 09:48
    Subject: MSCAN - named - Vulnerability
   =20
   =20
    It was reported to me by one of our technical people that "MSCAN" =
(supposedly - a well known vulnerability scanner of UNIX systems) that =
FreeBSD 2.2.5 is vulnerable in the following way:
    =20
    <Our-IP-address>: VULN: freebsd running named. try named overflow^@!
    =20
    This is a reference for futher reading:
    =20
    =
http://www.ja.net/CERT/CERT-CC/cert_advisories/CA-98.05.bind_problems
    =20
    Is FreeBSD 2.2.5 vulnerable to the named/bind overflow hack!
    =20
    Greg

------=_NextPart_000_005F_01BDC124.63050A20
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>

<META content=3Dtext/html;charset=3Diso-8859-1 =
http-equiv=3DContent-Type><!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 =
HTML//EN">
<META content=3D'"MSHTML 4.71.1712.3"' name=3DGENERATOR>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>This reference may also be useful:</FONT></DIV>
<DIV><FONT size=3D2></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2><A=20
href=3D"ftp://ftp.cert.org/pub/cert_advisories/CA-98.05.bind_problems">ft=
p://ftp.cert.org/pub/cert_advisories/CA-98.05.bind_problems</A></FONT></D=
IV>
<DIV>&nbsp;</DIV>
<DIV><FONT color=3D#000000 size=3D2>Basically what version of BIND is =
FreeBSD=20
using?</FONT></DIV>
<BLOCKQUOTE=20
style=3D"BORDER-LEFT: #000000 solid 2px; MARGIN-LEFT: 5px; PADDING-LEFT: =
5px">
    <DIV><FONT face=3DArial size=3D2><B>-----Original =
Message-----</B><BR><B>From:=20
    </B>Greg Quinlan &lt;<A=20
    =
href=3D"mailto:gquinlan@qmpgmc.ac.uk">gquinlan@qmpgmc.ac.uk</A>&gt;<BR><B=
>To:=20
    </B><A=20
    =
href=3D"mailto:freebsd-questions@freebsd.org">freebsd-questions@freebsd.o=
rg</A>=20
    &lt;<A=20
    =
href=3D"mailto:freebsd-questions@freebsd.org">freebsd-questions@freebsd.o=
rg</A>&gt;<BR><B>Cc:=20
    </B><A href=3D"mailto:ronno@blaze.net.au">ronno@blaze.net.au</A> =
&lt;<A=20
    =
href=3D"mailto:ronno@blaze.net.au">ronno@blaze.net.au</A>&gt;<BR><B>Date:=
=20
    </B>06 August 1998 09:48<BR><B>Subject: </B>MSCAN - named -=20
    Vulnerability<BR><BR></DIV></FONT>
    <DIV><FONT color=3D#000000 size=3D2>It was reported to me by one of =
our=20
    technical people that &quot;MSCAN&quot; (supposedly - a well known=20
    vulnerability scanner of UNIX systems) that FreeBSD 2.2.5 is =
vulnerable in=20
    the following way:</FONT></DIV>
    <DIV><FONT color=3D#000000 size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT color=3D#000000 size=3D2>&lt;Our-IP-address&gt;: VULN: =
freebsd=20
    running named. try named overflow^@!</FONT></DIV>
    <DIV><FONT color=3D#000000 size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT color=3D#000000 size=3D2>This is a reference for futher=20
    reading:<BR></FONT>&nbsp;</DIV>
    <DIV><FONT color=3D#000000 size=3D2><A=20
    =
href=3D"http://www.ja.net/CERT/CERT-CC/cert_advisories/CA-98.05.bind_prob=
lems">http://www.ja.net/CERT/CERT-CC/cert_advisories/CA-98.05.bind_proble=
ms</A></FONT></DIV>
    <DIV><FONT color=3D#000000 size=3D2><A=20
    =
href=3D"http://www.ja.net/CERT/CERT-CC/cert_advisories/CA-98.05.bind_prob=
lems"></A></FONT>&nbsp;</DIV>
    <DIV><FONT color=3D#000000 size=3D2>Is FreeBSD 2.2.5 vulnerable to =
the=20
    named/bind overflow hack!</FONT></DIV>
    <DIV><FONT color=3D#000000 size=3D2></FONT>&nbsp;</DIV>
    <DIV><FONT color=3D#000000 =
size=3D2>Greg</FONT></DIV></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_005F_01BDC124.63050A20--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?01bdc11c$0140a220$380051c2>