IP spoofing or buffer overflow attacks

Barry Margolin barmar at genuity.net
Thu Apr 27 19:58:22 UTC 2000


In article <802568CE.004D7C3A.00 at qedilc01.qedi.quintiles.com>,
 <philip.wolfe at quintiles.com> wrote:
>
>
>Hi Everyone,
>
>Could someone please point me in the direction of how to overcome/prevent IP
>spoofing and buffer overflow attacks on Port 53. I would like to cover both
>versions 4.9.4 ( This is marked for upgrade ) and 8.2.5.

The way to overcome them in 4.9.4 is to upgrade to 4.9.7 -- that version
was basically just a security bug-fix release, precisely for these types of
attacks.

I believe 8.2.2p5 has all the known buffer overflow problems fixed, so you
shouldn't need to do anything there.

-- 
Barry Margolin, barmar at genuity.net
Genuity, Burlington, MA
*** DON'T SEND TECHNICAL QUESTIONS DIRECTLY TO ME, post them to newsgroups.
Please DON'T copy followups to me -- I'll assume it wasn't posted to the group.



More information about the bind-users mailing list