<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bind Vulnerabilities in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843969#M741471</link>
    <description>Wes,&lt;BR /&gt;The BIND 9.1 distribution from HP is for HPUX 11i (11.11) only.  HP is still in the process of preparing the patches for the fixes for 11.0 (8.1.2) and 10.20/11.0 (4.9.7).  I would love to give you release dates for these patches, however this is not possible.  Our past experience has been to announce patches for security issues at the time of patch release and not prior to that time.   The most important reason for this that it is  possible for last-minute holdups to occur, or testing problems to delay release.   In that light, I'd recommend signing up for HP Security bulletins to receive notifications when the patches are made available. &lt;BR /&gt;I know this doesn't fully address the concerns and issues that you raised, but I hope it does help.  Regards,&lt;BR /&gt;Brian Hackley</description>
    <pubDate>Mon, 19 Feb 2001 19:13:28 GMT</pubDate>
    <dc:creator>Brian Hackley</dc:creator>
    <dc:date>2001-02-19T19:13:28Z</dc:date>
    <item>
      <title>Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843965#M741467</link>
      <description>Anyone know when HP will come out with Bind Fixes.  It sure seems as though HP is running a bit slow on bind fixes.  I don't like having to keep my bind servers in a vulnerable state for a month or so.&lt;BR /&gt;&lt;BR /&gt;Because HP is running so slow I'm consdering compiling on 11 8.2.3 from isc.  Anyone have any luck with it.  How's 4.9.8?</description>
      <pubDate>Fri, 16 Feb 2001 18:55:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843965#M741467</guid>
      <dc:creator>Wes Kaufmann</dc:creator>
      <dc:date>2001-02-16T18:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843966#M741468</link>
      <description>There was a story recently that both version 4 and 8 had a hole and that version 9 was the one to use.&lt;BR /&gt;There is a way to send update packets to these older versions that tell them to update their cached configurations without requiring a verified source.  This allows an underhanded person to change the IP that the name resolves to until the cached entry expires.</description>
      <pubDate>Fri, 16 Feb 2001 21:33:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843966#M741468</guid>
      <dc:creator>John Bolene</dc:creator>
      <dc:date>2001-02-16T21:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843967#M741469</link>
      <description>4.9.8 and 8.2.3 are both considered stable.&lt;BR /&gt;ALL previous versions of 4.X and 8.X have security holes.&lt;BR /&gt;&lt;BR /&gt;9.1.0 is also available.&lt;BR /&gt;&lt;BR /&gt;9.1.1rc2 is in beta.&lt;BR /&gt;&lt;BR /&gt;refer to:&lt;BR /&gt;&lt;A href="http://www.isc.org/products/BIND/" target="_blank"&gt;http://www.isc.org/products/BIND/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.cert.org/advisories/CA-2001-02.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2001-02.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Feb 2001 12:42:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843967#M741469</guid>
      <dc:creator>Mike Keighley</dc:creator>
      <dc:date>2001-02-19T12:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843968#M741470</link>
      <description>Thanks for the answer.  I just noticed that bind9 is available at the HP software depot.  Anyone have any exeriences with it?  How big of a pain is it to convert from 8 to 9?</description>
      <pubDate>Mon, 19 Feb 2001 15:11:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843968#M741470</guid>
      <dc:creator>Wes Kaufmann</dc:creator>
      <dc:date>2001-02-19T15:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843969#M741471</link>
      <description>Wes,&lt;BR /&gt;The BIND 9.1 distribution from HP is for HPUX 11i (11.11) only.  HP is still in the process of preparing the patches for the fixes for 11.0 (8.1.2) and 10.20/11.0 (4.9.7).  I would love to give you release dates for these patches, however this is not possible.  Our past experience has been to announce patches for security issues at the time of patch release and not prior to that time.   The most important reason for this that it is  possible for last-minute holdups to occur, or testing problems to delay release.   In that light, I'd recommend signing up for HP Security bulletins to receive notifications when the patches are made available. &lt;BR /&gt;I know this doesn't fully address the concerns and issues that you raised, but I hope it does help.  Regards,&lt;BR /&gt;Brian Hackley</description>
      <pubDate>Mon, 19 Feb 2001 19:13:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843969#M741471</guid>
      <dc:creator>Brian Hackley</dc:creator>
      <dc:date>2001-02-19T19:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843970#M741472</link>
      <description>We were running bind 4.9.7 on HP-UX 11.0. Instead of waiting for HP-UX patch, we have successfully installed ISC Bind 8.2.3. Our dns servers are now on production for about 2 weeks without any problem.&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;Usman</description>
      <pubDate>Tue, 27 Feb 2001 05:07:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843970#M741472</guid>
      <dc:creator>Usman</dc:creator>
      <dc:date>2001-02-27T05:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843971#M741473</link>
      <description>We got all of our machines fixed today with the HP patch.  We're happy campers for now that is until the next vulnerability comes out.  I believe we are going to have to start compiling the ISC code since it makes everyone here to nervous to wait for a HP patch on something that is announced to the entire hacker world such as the CERT Bind announcement was.  I probably had 15 scans hit our firewall looking for DNS servers.</description>
      <pubDate>Fri, 02 Mar 2001 19:09:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843971#M741473</guid>
      <dc:creator>Wes Kaufmann</dc:creator>
      <dc:date>2001-03-02T19:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843972#M741474</link>
      <description>fyi, those patch numbers are&lt;BR /&gt;&lt;BR /&gt;11.00:           PHNE_23274  (BIND 4.9.7)&lt;BR /&gt;11.00:            *          (BIND 8.1.2)&lt;BR /&gt;11.11:           PHNE_23275  (BIND 8.1.2)&lt;BR /&gt;11.04:           PHNE_22919  (BIND 4.9.7)&lt;BR /&gt;10.20:           PHNE_23277  (BIND 4.9.7)&lt;BR /&gt;10.24:           PHNE_23439  (BIND 4.9.7)&lt;BR /&gt;10.10:           PHNE_23277  (BIND 4.9.7)&lt;BR /&gt;10.01:           PHNE_23277  (BIND 4.9.7)&lt;BR /&gt;&lt;BR /&gt; * Note:  If you have upgraded HP-UX 11.00 BIND to 8.1.2 via the WEB upgrade you need to upgrade with the latest version of the BIND package, 1.3 via the website below.&lt;BR /&gt;&lt;BR /&gt;             &lt;A href="http://www.software.hp.com/products/DNS_BIND/index.html" target="_blank"&gt;http://www.software.hp.com/products/DNS_BIND/index.html&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 02 Mar 2001 19:51:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843972#M741474</guid>
      <dc:creator>John Bolene</dc:creator>
      <dc:date>2001-03-02T19:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843973#M741475</link>
      <description>Very interestiinnnggg. HP came here to check web security and ran a Nessus Scan Report. It reported the need to upgrade to 8.2.3 or 4.9.8 and another case to 8.2.2-P5 or later. I checked with HP on the latest Bind and on 5/2/1 they emailed me that 10.20 Bind 4.9.7 with PHNE_23277 was the latest which we had. So I guess we are current while being 4-5 releases back.</description>
      <pubDate>Tue, 08 May 2001 18:11:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843973#M741475</guid>
      <dc:creator>Bill Pontius</dc:creator>
      <dc:date>2001-05-08T18:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Bind Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843974#M741476</link>
      <description>thanks</description>
      <pubDate>Fri, 24 Jun 2005 11:13:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/bind-vulnerabilities/m-p/4843974#M741476</guid>
      <dc:creator>Wes Kaufmann</dc:creator>
      <dc:date>2005-06-24T11:13:25Z</dc:date>
    </item>
  </channel>
</rss>

