freebsd-ports/dns/bind96
Doug Barton 83aa56c48f Update to 9.4.1-P1, which has fixes for the following:
1. The default access control lists (acls) are not being
correctly set. If not set anyone can make recursive queries
and/or query the cache contents.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925

2. The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.

This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.

All users are encouraged to upgrade.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
2007-07-24 22:02:16 +00:00
..
distinfo Update to 9.4.1-P1, which has fixes for the following: 2007-07-24 22:02:16 +00:00
Makefile Update to 9.4.1-P1, which has fixes for the following: 2007-07-24 22:02:16 +00:00
pkg-descr Complete the update for bind94 after the repocopy, and hook it up. 2007-01-28 22:45:54 +00:00
pkg-message
pkg-plist Complete the update for bind94 after the repocopy, and hook it up. 2007-01-28 22:45:54 +00:00