Perhaps the BIND vulnerability scripts could say what version they found and are reporting on rather than looking elsewhere in the document to locate the BIND version?

David

Vulnerability found on port domain (53/tcp)

    The remote BIND server, according to its
    version number, is vulnerable to a DNS storm
    attack

    Solution : upgrade to bind 8.3.1
    Risk factor : High

Vulnerability found on port domain (53/tcp)

    The remote BIND server, according to its
    version number, is vulnerable to several
    attacks that can allow an attacker to gain
    root on this system.

    Solution : upgrade to bind 8.2.2-P5
    Risk factor : High
    CVE : CVE-1999-0833

Vulnerability found on port domain (53/tcp)

    The remote BIND server, according to its
    version number, is vulnerable to various buffer
    overflows that may allow an attacker to
    gain a shell on this host.

    Solution : upgrade to bind 8.2.3 or 4.9.8
    Risk factor : High
    CVE : CVE-2001-0010

-- 
I may have the information you need and I may choose only HTML.  It's up to
you. Disclaimer: I am not responsible for any email that you send me nor am
I bound to any obligation to deal with any received email in any given
fashion.  If you send me spam or a virus, I may in whole or part send you
50,000 return copies of it. I may also publically announce any and all
emails and post them to message boards, news sites, and even parody sites. 
I may also mark them up, cut and paste, print, and staple them to telephone
poles for the enjoyment of people without internet access.  This is not a
confidential medium and your assumption that your email can or will be
handled confidentially is akin to baring your backside, burying your head in
the ground, and thinking nobody can see you butt nekkid and in plain view
for miles away.  Don't be a cluebert, buy one from K-mart today.




Reply via email to