lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 5 Mar 2003 09:43:42 +0100
From: Gerhard den Hollander <gerhard@...ongeo.com>
To: David Kennedy CISSP <david.kennedy@....org>
Subject: Re: BIND 9.2.2 Vulnerabilities?


* David Kennedy CISSP <david.kennedy@....org> (Tue, Mar 04, 2003 at 04:26:05PM -0500)
> At 01:04 PM 3/4/03 -0600, John wrote: 
> 
> Heavily edited from the bind-announce message: 

So, does this mean that we can continue running 9.2.1 , or should we all
rush out and upgrade to 9.2.2 as there is a security leak waiting to be
exploited ?

Kind regards,
 --
Gerhard den Hollander                           Phone :+31-10.280.1515
Global IT Support manager                       Direct:+31-10.280.1539 
Jason Geosystems BV                             Fax   :+31-10.280.1511 
              (When calling please note: we are in GMT+1)
gdenhollander@...ongeo.com                          POBox 1573
visit us at http://www.jasongeo.com                 3000 BN Rotterdam  
JASON.......#1 in Reservoir Characterization        The Netherlands

      This e-mail and any attachment is/are intended solely for the named
  addressee(s) and may contain information that is confidential and privileged.
       If you are not the intended recipient, we request that you do not
         disseminate, forward, distribute or copy this e-mail message.
      If you have received this e-mail message in error, please notify us
           immediately by telephone and destroy the original message.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ