IP spoofing or buffer overflow attacks
Barry Margolin
barmar at genuity.net
Thu Apr 27 19:58:22 UTC 2000
In article <802568CE.004D7C3A.00 at qedilc01.qedi.quintiles.com>,
<philip.wolfe at quintiles.com> wrote:
>
>
>Hi Everyone,
>
>Could someone please point me in the direction of how to overcome/prevent IP
>spoofing and buffer overflow attacks on Port 53. I would like to cover both
>versions 4.9.4 ( This is marked for upgrade ) and 8.2.5.
The way to overcome them in 4.9.4 is to upgrade to 4.9.7 -- that version
was basically just a security bug-fix release, precisely for these types of
attacks.
I believe 8.2.2p5 has all the known buffer overflow problems fixed, so you
shouldn't need to do anything there.
--
Barry Margolin, barmar at genuity.net
Genuity, Burlington, MA
*** DON'T SEND TECHNICAL QUESTIONS DIRECTLY TO ME, post them to newsgroups.
Please DON'T copy followups to me -- I'll assume it wasn't posted to the group.
More information about the bind-users
mailing list