On Friday 23 March 2001 20:20, you wrote:
> Just in case others are not aware:
> >Date: Fri, 23 Mar 2001  9:40:03 -0700 (MST)

> >The following vendor update pages may help you in fixing the original BIND
> >vulnerability:
> >
> >Redhat Linux RHSA-2001:007-03 - Bind remote exploit
> >http://www.redhat.com/support/errata/RHSA-2001-007.html
> >Debian GNU/Linux DSA-026-1 BIND
> >http://www.debian.org/security/2001/dsa-026
> >SuSE Linux SuSE-SA:2001:03 - Bind 8 remote root compromise.
> >http://www.suse.com/de/support/security/2001_003_bind8_ txt.txt
> >Caldera Linux CSSA-2001-008.0 Bind buffer overflow
> >http://www.caldera.com/support/security/advisories/CSSA-2001-008.0.txt
> >http://www.caldera.com/support/security/advisories/CSSA-2001-008.1.txt
> >
>
> >If you have additional data on this worm or a critical quetsion  please
> >email [EMAIL PROTECTED]
> >-----BEGIN PGP SIGNATURE-----
> >Version: GnuPG v1.0.4 (BSD/OS)
> >Comment: For info see http://www.gnupg.org
> >
> >iD8DBQE6u17n+LUG5KFpTkYRAgn9AJ0ffubakBA47teAe9lF92lrS2H+TwCgh3T/
> >ek+YCliAS832nnMIzP28ezM=
> >=E1SG
> >-----END PGP SIGNATURE-----
>
> Rusty Carruth          Email:     [EMAIL PROTECTED] or
> [EMAIL PROTECTED] Voice: (480) 345-3621  SnailMail: Schlumberger ATE
> FAX:   (480) 345-8793             7855 S. River Parkway, Suite 116
> Ham: N7IKQ @ 146.82+,pl 162.2     Tempe, AZ 85284-1825
> ICBM: 33 20' 44"N   111 53' 47"W

Wonder why they didn't list:
LInux-Mandrake
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-017.php3?dis=7.2

Vincent was on the job right at the start.  If you have updated for security 
with our alerts, your system is not vulnerable.

Civileme

Reply via email to