AnNyung Official Homepage Home > Update [ 1.3 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



bind 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1215688966
업데이트 : 2008.07.10


상세내용

- 9.4.2-3 (9.4.2-P1) update
- fixed CVE-2008-1447
- !! 긴급 업데이트 해야 합니다. (remote attack 가능)

CVE-2008-1447:
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1,
9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2
and SP3, and Server 2003 SP1 and SP2; and other implementations allow
remote attackers to spoof DNS traffic via certain cache poisoning
techniques against recursive resolvers, related to insufficient
randomness of DNS transaction IDs and source ports, aka "DNS Insufficient
Socket Entropy Vulnerability." 


Autoupdates 지원 : 일부 지원
  pkgadd -F "bind*"


update 패키지

  RPMS :

    . bind-9.4.2-3.i686.rpm
    . bind-utils-9.4.2-3.i686.rpm
    . bind-devel-9.4.2-3.i686.rpm

  SRPMS :

    . bind-9.4.2-3.src.rpm


참고 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447



    



 Home > Update [ 1.3 ]

Copyright 2018 OOPS Development Organization 
LAST MODIFIED: 2016/04/24