Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re : Bind 4.9.6 ~ Current | X86 Exploit
From: robk () triple stack nl (Rob Kouwenberg)
Date: Wed, 17 Jun 1998 20:37:38 +0200


Hi !

I was a bit alarmed after this message.

Then I started out bithacking a bit for the following solution (IMHO improvement):


Solution: static named compilation & chrooted execution.

Situation:
OS: BSDi 2.1
named config files : /var/named

Necessary changes in bind-4.9.7-REL distribution :
Makefile:
71c71
< CC = gcc -static $(CPPFLAGS)
---
CC = cc $(CPPFLAGS)


cp named /var/named/named
cd /var/named
chmod 555 named
mkdir etc
ln -s ../named.boot etc/named.boot
mkdir var
ln -s .. var/named

chroot /var/named /named

$ nslookup www.apple.com
Server:  triple.stack.nl
Address:  131.155.141.167

Name:    www.apple.com
Address:  17.254.0.91


Sleeping steady until the real issue is solved.

Tadiho, regards, Rob Kouwenberg



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]