On Wed, Jul 09, 2008 at 10:45:09PM +0800, Zamri Besar wrote:
> Good morning,
> 
> Today, I'm received alert from one of my friends regarding to
> Vulnerability Note VU#800113 - Multiple DNS implementations vulnerable
> to cache poisoning.
> http://www.kb.cert.org/vuls/id/800113
> 
> I checked the above site, and found that most of the *BSD status are
> unknown. Is this bug affected OpenBSD default bind dns?
> 
> I'm don't know either the above bug is similar to this thread or not.
> http://marc.info/?l=openbsd-misc&m=118539211412877&w=2
I think named on OpenBSD 4.3 is affected too.
See
http://www.nabble.com/Actual-BIND-error---Patching-OpenBSD-4.3-named---td18357465.html

So long,

Andreas.

-- 
Windows 95: A 32-bit patch for a 16-bit GUI shell running on top of
an 8-bit operating system written for a 4-bit processor by a 2-bit
company who cannot stand 1 bit of competition.

Reply via email to