On Friday 23 March 2001 20:20, you wrote: > Just in case others are not aware: > >Date: Fri, 23 Mar 2001 9:40:03 -0700 (MST) > >The following vendor update pages may help you in fixing the original BIND > >vulnerability: > > > >Redhat Linux RHSA-2001:007-03 - Bind remote exploit > >http://www.redhat.com/support/errata/RHSA-2001-007.html > >Debian GNU/Linux DSA-026-1 BIND > >http://www.debian.org/security/2001/dsa-026 > >SuSE Linux SuSE-SA:2001:03 - Bind 8 remote root compromise. > >http://www.suse.com/de/support/security/2001_003_bind8_ txt.txt > >Caldera Linux CSSA-2001-008.0 Bind buffer overflow > >http://www.caldera.com/support/security/advisories/CSSA-2001-008.0.txt > >http://www.caldera.com/support/security/advisories/CSSA-2001-008.1.txt > > > > >If you have additional data on this worm or a critical quetsion please > >email [EMAIL PROTECTED] > >-----BEGIN PGP SIGNATURE----- > >Version: GnuPG v1.0.4 (BSD/OS) > >Comment: For info see http://www.gnupg.org > > > >iD8DBQE6u17n+LUG5KFpTkYRAgn9AJ0ffubakBA47teAe9lF92lrS2H+TwCgh3T/ > >ek+YCliAS832nnMIzP28ezM= > >=E1SG > >-----END PGP SIGNATURE----- > > Rusty Carruth Email: [EMAIL PROTECTED] or > [EMAIL PROTECTED] Voice: (480) 345-3621 SnailMail: Schlumberger ATE > FAX: (480) 345-8793 7855 S. River Parkway, Suite 116 > Ham: N7IKQ @ 146.82+,pl 162.2 Tempe, AZ 85284-1825 > ICBM: 33 20' 44"N 111 53' 47"W Wonder why they didn't list: LInux-Mandrake http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-017.php3?dis=7.2 Vincent was on the job right at the start. If you have updated for security with our alerts, your system is not vulnerable. Civileme