Bugtraq mailing list archives
Re : Bind 4.9.6 ~ Current | X86 Exploit
From: robk () triple stack nl (Rob Kouwenberg)
Date: Wed, 17 Jun 1998 20:37:38 +0200
Hi ! I was a bit alarmed after this message. Then I started out bithacking a bit for the following solution (IMHO improvement): Solution: static named compilation & chrooted execution. Situation: OS: BSDi 2.1 named config files : /var/named Necessary changes in bind-4.9.7-REL distribution : Makefile: 71c71 < CC = gcc -static $(CPPFLAGS) ---
CC = cc $(CPPFLAGS)
cp named /var/named/named cd /var/named chmod 555 named mkdir etc ln -s ../named.boot etc/named.boot mkdir var ln -s .. var/named chroot /var/named /named $ nslookup www.apple.com Server: triple.stack.nl Address: 131.155.141.167 Name: www.apple.com Address: 17.254.0.91 Sleeping steady until the real issue is solved. Tadiho, regards, Rob Kouwenberg
Current thread:
- Re : Bind 4.9.6 ~ Current | X86 Exploit Rob Kouwenberg (Jun 17)
- Re: Re : Bind 4.9.6 ~ Current | X86 Exploit Theo de Raadt (Jun 19)