From owner-freebsd-security Wed Jan 31 14: 5:15 2001 Delivered-To: freebsd-security@freebsd.org Received: from fw.wintelcom.net (ns1.wintelcom.net [209.1.153.20]) by hub.freebsd.org (Postfix) with ESMTP id 5CC0937B67D for ; Wed, 31 Jan 2001 14:04:56 -0800 (PST) Received: (from bright@localhost) by fw.wintelcom.net (8.10.0/8.10.0) id f0VM4lD20113; Wed, 31 Jan 2001 14:04:47 -0800 (PST) Date: Wed, 31 Jan 2001 14:04:47 -0800 From: Alfred Perlstein To: Roman Shterenzon Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind Message-ID: <20010131140447.E26076@fw.wintelcom.net> References: <200101312123.f0VLNL134920@freefall.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from roman@xpert.com on Wed, Jan 31, 2001 at 11:55:18PM +0200 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org * Roman Shterenzon [010131 13:56] wrote: > On Wed, 31 Jan 2001, FreeBSD Security Advisories wrote: > > > ============================================================================= > > FreeBSD-SA-01:18 Security Advisory > > > > Topic: BIND remotely exploitable buffer overflow > ..snip.. > > Why not make it default in the base system? It has been, but only for several days. -- -Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org] "I have the heart of a child; I keep it in a jar on my desk." To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message