>
> I ran a security check on ShareTheNet 2.1.3 and it reported:
Which one?
>
> The remote bind version is : 4.9.7-REL
> The remote BIND server, according to its
> version number, is vulnerable to various buffer
> overflows that may allow an attacker to
> gain a shell on this host.
>
> Solution : upgrade to bind 8.2.3 or 4.9.8
> Risk factor : High
>
> Anyone fixed this? Any Clues?
There is no way to get a shell since there is no telnet server. However, it
can probably be the subject of a DOS attack. I'm in the process of building
the GPL release and will fix it then.
For now here are the choices:
1) Just leave it.
2) Disable DNS. These days, unless you have a specific need for DNS (like
you're serving your own network), then your ISP's DNS is probably better
anyway.
Regards,
John
============================================================
Your shoe frustration is offline. Your shoe selection is
online... at Zappos.com. Hard-to-find sizes in brands like
Bass, Dexter, Hush Puppies, Skechers, and Steve Madden:
http://click.topica.com/caaabQIbz8Rp2bAfyICf/Zappos
============================================================
--
Visit http://www.ShareTheNet.com for info about ShareTheNet
Visit http://www.topica.com/lists/sharethenet for info about this list
To Unsubscribe send email to: [EMAIL PROTECTED]
==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?bz8Rp2.bAfyIC
Or send an email To: [EMAIL PROTECTED]
This email was sent to: [email protected]
T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================