On Wed, Jul 09, 2008 at 10:45:09PM +0800, Zamri Besar wrote: > Good morning, > > Today, I'm received alert from one of my friends regarding to > Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable > to cache poisoning. > http://www.kb.cert.org/vuls/id/800113 > > I checked the above site, and found that most of the *BSD status are > unknown. Is this bug affected OpenBSD default bind dns? > > I'm don't know either the above bug is similar to this thread or not. > http://marc.info/?l=openbsd-misc&m=118539211412877&w=2 I think named on OpenBSD 4.3 is affected too. See http://www.nabble.com/Actual-BIND-error---Patching-OpenBSD-4.3-named---td18357465.html
So long, Andreas. -- Windows 95: A 32-bit patch for a 16-bit GUI shell running on top of an 8-bit operating system written for a 4-bit processor by a 2-bit company who cannot stand 1 bit of competition.