Bugtraq mailing list archives
Re: CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND
From: solar () FALSE COM (Solar Designer)
Date: Fri, 12 Nov 1999 23:43:08 +0300
Hello,
course, recommend upgrading. In addition, we recommend running your nameserver as non-root and chrooted (I know setting this up is non-trivial -- it'll be much, much easier in BINDv9).
While we're on the topic, there's a patch for running BIND 4.9.7 as non-root and chrooted, as well as instructions on setting up the jail, at: http://www.openwall.com/bind/ Signed, Solar Designer
Current thread:
- (no subject) Anonymous (Nov 10)
- (no subject) David R. Conrad (Nov 11)
- Re: CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND Solar Designer (Nov 12)
- Buffer overflow exploit in the alpha linux Taeho Oh (Nov 13)
- Re: Buffer overflow exploit in the alpha linux Lamont Granquist (Nov 15)
- Re: your mail Brian Wellington (Nov 11)
- Re: your mail Alan Brown (Nov 12)
- [ Cobalt ] Security Advisory - Bind Jeff Bilicki (Nov 12)
- Microsoft Security Bulletin (MS99-049) Aleph One (Nov 12)
- Re: your mail Alain Thivillon (Nov 11)
- [w00giving '99 #3, w00news] UnixWare 7's /var/sadm Matt Conover (Nov 11)
- Re: your mail Firstname Lastname (Nov 12)
- (no subject) David R. Conrad (Nov 11)