patch for named buffer overflow now available (fwd)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---------- Forwarded message ----------
Date: Thu, 14 Nov 2002 19:12:41 -0700
From: Todd C. Miller <Todd.Miller@courtesan.com>
To: security-announce@openbsd.org
Subject: patch for named buffer overflow now available

A patch for the named buffer overflow is now available.  The bug
could allow an attacker to execute code as the user that named runs
as.  In the default OpenBSD named configuration, named runs as its
own, non-root, user in a chrooted jail.  This lessens the impact
of the bug to the level of a denial of service.  Anyone not running
named chrooted should start to do so immediately.

For more information on the bug, please see:
http://www.isc.org/products/BIND/bind-security.html
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469

The fix has been committed to OpenBSD-current as well as to the
3.2, 3.1 and 3.0 -stable branches.

The following patches are also available for OpenBSD 3.2, 3.1 and 3.0
respectively:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/005_named.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/019_named.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/036_named.patch


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux