Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Jul 2007 01:46:36 +0200
From:      "Simon L. Nielsen" <>
To:        FreeBSD Questions <>,
Cc:        FreeBSD Security Team <>, Jeffrey Goldberg <>
Subject:   Re: Waiting for BIND security announcement
Message-ID:  <>
In-Reply-To: <>
References:  <>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help

Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

[freebsd-security@ CC'ed to avoid answering the same there again
shorly :) - if following up, please drop either freebsd-questions or
freebsd-securiy to avoid "spamming" both lists]

On 2007.07.24 18:15:43 -0500, Jeffrey Goldberg wrote:

> As I'm sure many people know there is a newly discovered BIND vulnerabili=
> allowing cache injection (pharming).  See
> for details.
> The version of bind on 6.2, 9.3.3, looks like it is vulnerable (along wit=
> many other versions).  It's not particularly an issue for me since my nam=
> servers aren't publicly queryable, but I am curios about how things like=
> security problems in
> src/contrib get handled in FreeBSD.

Yes, the FreeBSD Security Team and the FreeBSD BIND maintainer are
aware of the issue and are working on fixing it in FreeBSD as soon as

More details about the issue can be found at: .

Our general security handling policies can be found at: .

Simon L. Nielsen
FreeBSD Deputy Security Officer

Content-Type: application/pgp-signature
Content-Disposition: inline

Version: GnuPG v1.4.7 (FreeBSD)



Want to link to this message? Use this URL: <>