×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
Not sure specifically on that vuln, but on another DNS BIND 8 vuln I called
IBM about, they told me about a migration to a more up to date BIND that is
available once you are on V6R1.
"Jim Franz"
<franz400@xxxxxxx
r.com> To
Sent by: <MIDRANGE-L@xxxxxxxxxxxx>
midrange-l-bounce cc
s@xxxxxxxxxxxx
Subject
dns cache poisoning
07/09/2008 11:46
PM
Please respond to
Midrange Systems
Technical
Discussion
<midrange-l@midra
nge.com>
Any indication the i has issues with the dns cache poisoning vulnerability?
The Cert reference mentions Bind 8 which is where V5R3 was at and guess we
still are. IBM eserver listed as "unknown" as in no response (yet) from
vendor.
http://www.kb.cert.org/vuls/id/800113
Bind 8 specifically in this link:
http://www.kb.cert.org/vuls/id/927905
Jim Franz
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit:
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at
http://archive.midrange.com/midrange-l.
_____________________________________________________________________________
Scanned by IBM Email Security Management Services powered by MessageLabs.
For more information please visit
http://www.ers.ibm.com
_____________________________________________________________________________
As an Amazon Associate we earn from qualifying purchases.