Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-md5; protocol="application/pgp-signature"; boundary="9amGYk9869ThD9tj" Content-Disposition: inline User-Agent: Mutt/1.1.11i --9amGYk9869ThD9tj Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Nov 07, 2000 at 01:40:49PM +0100, Fabio Pietrosanti (naif) wrote: > I should assume that bind 8.2.2-P5 it's vulnerable ( Please someone > test and confirm this kind of dos) Confirmed. I played around a bit and have following reproducable test: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3D20546 Best regards, Daniel --=20 ---------------------------------------------------------------------- entire systems GmbH | droesen@entire-systems.com Internet Services | Phone: +49 2624 9550-55=20 Ferbachstrasse 12 | Fax: +49 2624 9550-20 D-56203 Hoehr-Grenzhausen | http://www.entire-systems.com/ ---------------------------------------------------------------------- --9amGYk9869ThD9tj Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6CewG92z7ZHglglwRAiqjAKCzPe5OAG3w7B5uvfM7lLcJv/xPDACg6/OT ObIWJKX744BZP1tdVq7CBgk= =V9MZ -----END PGP SIGNATURE----- --9amGYk9869ThD9tj--