new bind security bug? Re: [FreeBSD-Announce] FreeBSD Security
Advisory FreeBSD-SA-11:02.bind
Glen Barber
glen.j.barber at gmail.com
Fri Jul 8 01:38:23 UTC 2011
On 7/7/11 8:43 PM, Michael Scheidell wrote:
> <http://threatpost.com/en_us/blogs/new-bind-release-fixes-high-severity-remote-bugs-070611>
>
>
> The high-severity vulnerability in many versions of the BIND software
> has the effect of causing the BIND server to exit when it receives a
> specially formatted packet. The ISC said that although it isn't aware of
> any public exploits for the bug, it still recommends that organizations
> upgrade to one of the newer versions of BIND, which include
> 9.6-ESV-R4-P3, 9.7.3-P3 or 9.8.0-P4.
>
See:
http://svnweb.freebsd.org/base?view=revision&revision=223815
Regards,
--
Glen Barber
More information about the freebsd-security
mailing list